ZKTeco MB10-VL Face Recognition Hybrid Biometric Time & Attendance and Access Control Terminal in BD
- Visible Light facial recognition
- Anti-spoofing algorithm against print attack (laser, color and B/W photos), videos attack and 3D mask attack
- Multiple verification methods: Face / Fingerprint / Card / Password
- TCP/IP network and USB Host
- Standard with Built-in SSR Excel Software
- Simple access control
- Warranty: One Year
ZKTeco MB10-VL Price in Bangladesh
Price: | ৳ 7,000 |
Brand: | ZKTeco |
Model: | MB10-VL |
Item: | Face & Fingerprint Time Attendance |
Contact No: | +88 01785-777722 |
Status: | In Stock |
Warranty: | One Year |
Specifications
screen | Touchscreen TFT measuring 2.8 inches. |
face capacity | 100 |
Fingerprint capacity | 500 |
card capacity | 500 (optional) |
transaction capacity | 50,000 |
communication | TCP/IP, USB Host, Wi-Fi ( optional ), |
standard function | ADMS, DST, Self-service Query, Automatic Status Switch, T9 Input, Camera, 9-digit User ID, Multiple Verfication Methods, Bell Scheduling, SSR |
hardware | 1GHz Dual-Core CPU, 256MB RAM/ 256MB Flash, 1MP Binocular Camera |
operating system | Linux |
access control interface | 3rd Party Electric Lock, Door Sensor, Exit Button |
Biometric algorithm | ZKFace V3.8 / ZKFinger V10.0 |
face detection speed | ≤1s |
power supply | 5V 2A |
suitable humidity for use | 20% to 80% |
suitable temperature for use | 0°C to 45°C |
Size (Width*Height*Depth) | 168.0*151.5*31.7(mm) |
Supported software | ZKTime.Net 4.0 |
ZKTeco’s MB10-VL Time and Attendance and Access Control Prices in Bangladesh
ZKTeco MB10VL is a touchless multibiometric identification terminal that uses ZKTeco’s Visible Light Facial Recognition technology. The device is capable of recognizing a target from a distance of 30cm to 50cm using the latest algorithm and Visible Light facial detection technologies. The device will activate automatically when it detects human faces within the detection distance. This allows for faster and more accurate recognition than previous near-infrared facial identification terminals. The Deep Learning algorithm has greatly improved the pose angle tolerance, anti-spoofing ability and resistance to dynamic environments and other spoofing attacks. The MB10-VL, which includes the cutting-edge 3D Neuron Fingerprint Algorithm as well as comprehensive support for mainstream card modules, is the perfect fit for different working environments and customer needs. ESTALLBD offers the best prices for MB10-VL fingerprint attendance and face recognition device for offices, garments, factory, and other applications.
ZKTeco Time and Attendance device, Access control are fundamental concepts in security that reduce risk to the organization or business. Access management is the process of managing access to places or resources. This system provides a means for securing restricted access. Accessing can be defined as the act of consuming, entering, and/or using.
There are two types of access control: logical and physical. Physical access control restricts access to buildings, rooms, campuses, and other IT assets. Logical access controls limit connections to computer networks, system files and data.
How it works:
Access control systems are responsible for the authorization and identification authentication of users and entities to secure facilities. They can evaluate required login credentials, which could include passwords and personal identification numbers (PINs), biometric scanners, security tokens and other authentication factors. Multifactor authentication is often an integral part of the layered defense that protects access control systems. It requires multiple authentication factors.
ZKTeco Access control topology
The credentials are compared to an access control system list to make decisions. A host, server, access control panel or reader can perform this look-up. Access control systems have seen a steady shift in the lookup from the central host to the edges of the system or the reader. The control panel is responsible for the lookup and control functions. The spokes communicate via a serial connection, usually RS-485. Manufacturers have placed a controller at each door to speed up decision-making. These controllers can be IP enabled and connect to standard networks using standard networks.