Leading global provider of security and safety solutions, Allegion, presents the latest in reliable and convenient biometric technology with its Schlage Handkey II. Ideal for use in a whole host of applications from health clubs and childcare centers, through to laboratories and prisons, Allegion’s access control reader utilizes field-proven hand geometry technology. It successfully maps and verifies the size and shape of a person’s hand in less than one second, making it ideal for high output applications. Each Handkey II offers complete door control, providing door lock operation, request for exit and alarm monitoring. It can be used as a stand-alone security solution or can form part of networked system ensuring all security requirements are met. The access control reader features a card reader emulation mode making integration with an existing system quick and easy, and each identity is proven because the reader relies on hand measurement. The use of hand geometry means no fingerprints or palm prints are taken, meaning the user does not leave behind any trace of their biometric data. The measurements of a person’s hand size and shape are converted into a numerical algorithm, which is the only data that is stored. This ensures any privacy concerns are eliminated and users can enjoy complete peace of mind. Sylvain Bocquet, Electronics Leader for Allegion EMEA said: “Biometrics is the most advanced security solutions on the market today and the Schlage Handkey II allows any security system to reap the benefits of this technology. In addition to its obvious security advantages, the hand geometry readers eliminate the need of a card or key, therefore reducing administrative costs while greatly increasing the level of security.” The Handkey II comes with a variety of communication options, such as dial-up modems and Ethernet, allowing a system design which can meet all needs. All information, including biometric data and decision-making capabilities, reside locally ensuring all doors are secure and will operate fully even if all communications to the system are lost.
Protecting Dormitory Residents and AssetsDownload
Protecting Critical Infrastructure Through Facial RecognitionDownload
12 Questions To Ask Your Access Control ProviderDownload
Providing Frictionless Cloud Video Storage as a Service (VSaaS)Download