SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
201 Circle Drive N, Suite 116 Piscataway NJ 08854 Tel: 732-412-6007
www.zktechnology.com Page 1
LA2000-MEC
Features
 Fingerprint sensor with Multi Spectral technology which reads beneath the skin’s
surface
 1-touch 1-second employee recognition with ZK’s latest fingerprint matching algorithm
ver 10.0
 Capacity to store 8000 template and 200000 transactions
 Large 4 line Graphic LCD display for rich user interface
 USB HOST port enables data transfer of log and templates to a USB flash drive easily in
the absence of network connectivity.
 Multifactor authentication options using Card/PIN or Password
 Audio and Visual feedback for accepted and rejected fingerprint identification or
verification
 Multi Language firmware which supports English and Spanish by default. Optional
French and Portuguese language support also available.
 Supports 50 time zones,5 groups and 10 unlock combinations to make this reader a
truly standalone access control reader
 Tamper-proof switch will trigger the alarm if the unit is vandalized
 Operates stand-alone without a computer.
 TCP/IP ,serial and Weigand communication for connecting to a network or a third party
access control panel.
 SDK available for OEM customers and software developers.
201 Circle Drive N, Suite 116 Piscataway NJ 08854 Tel: 732-412-6007
www.zktechnology.com Page 2
Specification
LA2000-MEC
CPU ZK Multi-Bio 600MHz
Memory 128MB flash + 32MB RAM
Hardware Platform ZEM600
Fingerprint Sensor Lumidigm’s Mercury sensor
Display 16 Char x 4 Lines Black & White LCD
Fingerprint capacity 8000
Logs capacity 200,000
Algorithm Version ZKFinger10.0 default,ZKFinger 9.0 selectable
Communication Ethernet(10/100M), RS232/485, USB-HOST and Weigand
Access control
interfaces for
3rd
party electric lock, door sensor, alarm , Doorbell, exit
button
Power supply 12VDC, 3A
Verification Speed ≤2 sec
Operating temp 0℃- 45 ℃
Operating Humidity 20%-80%
SIZE 107.4*229*101.1 mm
201 Circle Drive N, Suite 116 Piscataway NJ 08854 Tel: 732-412-6007
www.zktechnology.com Page 3
Basic Contents
LA2000 Access control
device Metallic Mounting Plate
Mounting Template
Star-shape Screw for
Mounting Plate Star-shape Screw Driver,
Rubber Gasket
Wall Mounting Screws
and Holders-6ea
Mini-USB Installation Guide
Diode 4 pin Ethernet Cable
2pin, 7pin, 8pin, 10pin
pig tail cables
201 Circle Drive N, Suite 116 Piscataway NJ 08854 Tel: 732-412-6007
www.zktechnology.com Page 4
Front Panel
201 Circle Drive N, Suite 116 Piscataway NJ 08854 Tel: 732-412-6007
www.zktechnology.com Page 5
Side Panel
201 Circle Drive N, Suite 116 Piscataway NJ 08854 Tel: 732-412-6007
www.zktechnology.com Page 6
Rear Panel
Installation Example
201 Circle Drive N, Suite 116 Piscataway NJ 08854 Tel: 732-412-6007
www.zktechnology.com Page 7
201 Circle Drive N, Suite 116 Piscataway NJ 08854 Tel: 732-412-6007
www.zktechnology.com Page 8
Cable Specifications

Weitere ähnliche Inhalte

Was ist angesagt?

ZKTeco inBio260 Pro Bangladesh, ZKTeco Bangladesh
ZKTeco inBio260 Pro Bangladesh, ZKTeco BangladeshZKTeco inBio260 Pro Bangladesh, ZKTeco Bangladesh
ZKTeco inBio260 Pro Bangladesh, ZKTeco BangladeshTrimatrik Multimedia
 
I clock680 | Fingerprint Time Attendance Systems in Bangladesh
I clock680 | Fingerprint Time Attendance Systems in Bangladesh I clock680 | Fingerprint Time Attendance Systems in Bangladesh
I clock680 | Fingerprint Time Attendance Systems in Bangladesh Abdullah Al Masum
 
RFID APPLICATION PROJECTS-RFID TAG-Rfid based campus management system
RFID APPLICATION PROJECTS-RFID TAG-Rfid based campus management systemRFID APPLICATION PROJECTS-RFID TAG-Rfid based campus management system
RFID APPLICATION PROJECTS-RFID TAG-Rfid based campus management systemASHOKKUMAR RAMAR
 
Point mobile pm80 industrie handheld computer
Point mobile pm80 industrie handheld computerPoint mobile pm80 industrie handheld computer
Point mobile pm80 industrie handheld computercarema123
 
Bio usb e-specification- www.ttbvs.com
Bio usb e-specification- www.ttbvs.comBio usb e-specification- www.ttbvs.com
Bio usb e-specification- www.ttbvs.comTTBVS
 
AMREL Rugged Mobile Biometric Line
AMREL Rugged Mobile Biometric LineAMREL Rugged Mobile Biometric Line
AMREL Rugged Mobile Biometric Lineamrelmarcomm
 
Pricelist icon 2012 4
Pricelist icon 2012 4Pricelist icon 2012 4
Pricelist icon 2012 4S_Asih
 
Bio usb m-specification- www.ttbvs.com
Bio usb m-specification- www.ttbvs.comBio usb m-specification- www.ttbvs.com
Bio usb m-specification- www.ttbvs.comTTBVS
 
Máy tính công nghiệp Quanmax Ubiq-100
Máy tính công nghiệp Quanmax Ubiq-100Máy tính công nghiệp Quanmax Ubiq-100
Máy tính công nghiệp Quanmax Ubiq-100Long Trump
 
Bl r8782 ms1-specification-www.ttbvs.com
Bl r8782 ms1-specification-www.ttbvs.comBl r8782 ms1-specification-www.ttbvs.com
Bl r8782 ms1-specification-www.ttbvs.comTTBVS
 
Semlex's Crossfinger - ENG
Semlex's Crossfinger - ENGSemlex's Crossfinger - ENG
Semlex's Crossfinger - ENGSemlex Europe
 
iHANG TECH CO -
iHANG TECH CO - iHANG TECH CO -
iHANG TECH CO - Yoli Ma
 
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardCant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardSlawomir Jasek
 

Was ist angesagt? (19)

ZKTeco inBio260 Pro Bangladesh, ZKTeco Bangladesh
ZKTeco inBio260 Pro Bangladesh, ZKTeco BangladeshZKTeco inBio260 Pro Bangladesh, ZKTeco Bangladesh
ZKTeco inBio260 Pro Bangladesh, ZKTeco Bangladesh
 
Olo Cust Prez
Olo Cust Prez  Olo Cust Prez
Olo Cust Prez
 
Zkteco uface902 Bangladesh
Zkteco uface902 BangladeshZkteco uface902 Bangladesh
Zkteco uface902 Bangladesh
 
I clock680 | Fingerprint Time Attendance Systems in Bangladesh
I clock680 | Fingerprint Time Attendance Systems in Bangladesh I clock680 | Fingerprint Time Attendance Systems in Bangladesh
I clock680 | Fingerprint Time Attendance Systems in Bangladesh
 
RFID APPLICATION PROJECTS-RFID TAG-Rfid based campus management system
RFID APPLICATION PROJECTS-RFID TAG-Rfid based campus management systemRFID APPLICATION PROJECTS-RFID TAG-Rfid based campus management system
RFID APPLICATION PROJECTS-RFID TAG-Rfid based campus management system
 
Elm wifi
Elm wifiElm wifi
Elm wifi
 
Point mobile pm80 industrie handheld computer
Point mobile pm80 industrie handheld computerPoint mobile pm80 industrie handheld computer
Point mobile pm80 industrie handheld computer
 
Bio usb e-specification- www.ttbvs.com
Bio usb e-specification- www.ttbvs.comBio usb e-specification- www.ttbvs.com
Bio usb e-specification- www.ttbvs.com
 
ZKTeco IN05-A Bangladesh
ZKTeco IN05-A BangladeshZKTeco IN05-A Bangladesh
ZKTeco IN05-A Bangladesh
 
InHand Fury-X™: Mobile, IOT Platform Optimized
InHand Fury-X™: Mobile, IOT Platform OptimizedInHand Fury-X™: Mobile, IOT Platform Optimized
InHand Fury-X™: Mobile, IOT Platform Optimized
 
ELO ET 2002L
ELO ET 2002LELO ET 2002L
ELO ET 2002L
 
AMREL Rugged Mobile Biometric Line
AMREL Rugged Mobile Biometric LineAMREL Rugged Mobile Biometric Line
AMREL Rugged Mobile Biometric Line
 
Pricelist icon 2012 4
Pricelist icon 2012 4Pricelist icon 2012 4
Pricelist icon 2012 4
 
Bio usb m-specification- www.ttbvs.com
Bio usb m-specification- www.ttbvs.comBio usb m-specification- www.ttbvs.com
Bio usb m-specification- www.ttbvs.com
 
Máy tính công nghiệp Quanmax Ubiq-100
Máy tính công nghiệp Quanmax Ubiq-100Máy tính công nghiệp Quanmax Ubiq-100
Máy tính công nghiệp Quanmax Ubiq-100
 
Bl r8782 ms1-specification-www.ttbvs.com
Bl r8782 ms1-specification-www.ttbvs.comBl r8782 ms1-specification-www.ttbvs.com
Bl r8782 ms1-specification-www.ttbvs.com
 
Semlex's Crossfinger - ENG
Semlex's Crossfinger - ENGSemlex's Crossfinger - ENG
Semlex's Crossfinger - ENG
 
iHANG TECH CO -
iHANG TECH CO - iHANG TECH CO -
iHANG TECH CO -
 
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardCant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
 

Andere mochten auch

2 programacion (estructura_de_datos)
2 programacion (estructura_de_datos)2 programacion (estructura_de_datos)
2 programacion (estructura_de_datos)Angie Camacho
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016Andrew Chen
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
 

Andere mochten auch (8)

1467
14671467
1467
 
2 programacion (estructura_de_datos)
2 programacion (estructura_de_datos)2 programacion (estructura_de_datos)
2 programacion (estructura_de_datos)
 
1567
15671567
1567
 
02 programacion
02 programacion02 programacion
02 programacion
 
L
LL
L
 
Cambio climatico
Cambio climaticoCambio climatico
Cambio climatico
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 

Ähnlich wie 219 ndd la2000(mercury)-en

Ähnlich wie 219 ndd la2000(mercury)-en (20)

CCTV Catalogue
CCTV CatalogueCCTV Catalogue
CCTV Catalogue
 
Bio stamp 2c_-_bst2c02
Bio stamp 2c_-_bst2c02Bio stamp 2c_-_bst2c02
Bio stamp 2c_-_bst2c02
 
ZKTeco iClock580 Bangladesh
ZKTeco iClock580 BangladeshZKTeco iClock580 Bangladesh
ZKTeco iClock580 Bangladesh
 
Act1000
Act1000Act1000
Act1000
 
F18
F18F18
F18
 
Bio scribe 2c_-_bsc2c01
Bio scribe 2c_-_bsc2c01Bio scribe 2c_-_bsc2c01
Bio scribe 2c_-_bsc2c01
 
Suprema Bio Station T2
Suprema Bio Station T2 Suprema Bio Station T2
Suprema Bio Station T2
 
Bio stamp 3s_-_bst3s02
Bio stamp 3s_-_bst3s02Bio stamp 3s_-_bst3s02
Bio stamp 3s_-_bst3s02
 
Acs ac2100 v2.12
Acs ac2100 v2.12Acs ac2100 v2.12
Acs ac2100 v2.12
 
Protege Hardware Sales Updated October 2008
Protege Hardware Sales Updated October 2008Protege Hardware Sales Updated October 2008
Protege Hardware Sales Updated October 2008
 
BioScribe-3S Biometric Attendance Device
BioScribe-3S Biometric Attendance DeviceBioScribe-3S Biometric Attendance Device
BioScribe-3S Biometric Attendance Device
 
Di xs access-control_solutions (1)
Di xs access-control_solutions (1)Di xs access-control_solutions (1)
Di xs access-control_solutions (1)
 
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEMINTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
 
wecon catalogue
wecon cataloguewecon catalogue
wecon catalogue
 
1-150I11A352
1-150I11A3521-150I11A352
1-150I11A352
 
Xtrem n p1560t
Xtrem n p1560tXtrem n p1560t
Xtrem n p1560t
 
Time attendance
Time attendanceTime attendance
Time attendance
 
Act500
Act500Act500
Act500
 
ZkTeco South Africa Catelogue
ZkTeco South Africa CatelogueZkTeco South Africa Catelogue
ZkTeco South Africa Catelogue
 
Exor e top510_specsheet
Exor e top510_specsheetExor e top510_specsheet
Exor e top510_specsheet
 

Kürzlich hochgeladen

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

219 ndd la2000(mercury)-en

  • 1. 201 Circle Drive N, Suite 116 Piscataway NJ 08854 Tel: 732-412-6007 www.zktechnology.com Page 1 LA2000-MEC Features  Fingerprint sensor with Multi Spectral technology which reads beneath the skin’s surface  1-touch 1-second employee recognition with ZK’s latest fingerprint matching algorithm ver 10.0  Capacity to store 8000 template and 200000 transactions  Large 4 line Graphic LCD display for rich user interface  USB HOST port enables data transfer of log and templates to a USB flash drive easily in the absence of network connectivity.  Multifactor authentication options using Card/PIN or Password  Audio and Visual feedback for accepted and rejected fingerprint identification or verification  Multi Language firmware which supports English and Spanish by default. Optional French and Portuguese language support also available.  Supports 50 time zones,5 groups and 10 unlock combinations to make this reader a truly standalone access control reader  Tamper-proof switch will trigger the alarm if the unit is vandalized  Operates stand-alone without a computer.  TCP/IP ,serial and Weigand communication for connecting to a network or a third party access control panel.  SDK available for OEM customers and software developers.
  • 2. 201 Circle Drive N, Suite 116 Piscataway NJ 08854 Tel: 732-412-6007 www.zktechnology.com Page 2 Specification LA2000-MEC CPU ZK Multi-Bio 600MHz Memory 128MB flash + 32MB RAM Hardware Platform ZEM600 Fingerprint Sensor Lumidigm’s Mercury sensor Display 16 Char x 4 Lines Black & White LCD Fingerprint capacity 8000 Logs capacity 200,000 Algorithm Version ZKFinger10.0 default,ZKFinger 9.0 selectable Communication Ethernet(10/100M), RS232/485, USB-HOST and Weigand Access control interfaces for 3rd party electric lock, door sensor, alarm , Doorbell, exit button Power supply 12VDC, 3A Verification Speed ≤2 sec Operating temp 0℃- 45 ℃ Operating Humidity 20%-80% SIZE 107.4*229*101.1 mm
  • 3. 201 Circle Drive N, Suite 116 Piscataway NJ 08854 Tel: 732-412-6007 www.zktechnology.com Page 3 Basic Contents LA2000 Access control device Metallic Mounting Plate Mounting Template Star-shape Screw for Mounting Plate Star-shape Screw Driver, Rubber Gasket Wall Mounting Screws and Holders-6ea Mini-USB Installation Guide Diode 4 pin Ethernet Cable 2pin, 7pin, 8pin, 10pin pig tail cables
  • 4. 201 Circle Drive N, Suite 116 Piscataway NJ 08854 Tel: 732-412-6007 www.zktechnology.com Page 4 Front Panel
  • 5. 201 Circle Drive N, Suite 116 Piscataway NJ 08854 Tel: 732-412-6007 www.zktechnology.com Page 5 Side Panel
  • 6. 201 Circle Drive N, Suite 116 Piscataway NJ 08854 Tel: 732-412-6007 www.zktechnology.com Page 6 Rear Panel Installation Example
  • 7. 201 Circle Drive N, Suite 116 Piscataway NJ 08854 Tel: 732-412-6007 www.zktechnology.com Page 7
  • 8. 201 Circle Drive N, Suite 116 Piscataway NJ 08854 Tel: 732-412-6007 www.zktechnology.com Page 8 Cable Specifications