The HandKey II biometric terminal is ideal for access control applications requiring the highest level of security. This unique Schlage technology utilizes the geometry of the human hand as a credential. HandKey II readers capture the shape and size of a hand, taking over 90 distinct measurements. They then convert and store the measurements as a 9-byte numerical identification template completely unique to each person making the hand a key to the entry.
The HandKey II functions as a standalone unit or is easily integrated into an existing access control system. As an access controller, it provides lock mechanism management with request-to-exit and alarm monitoring. Alarms include tampering response, ID refusal, excessive scan attempts, user duress, and power failure. The HandKey II is also easy to maintain, making it an ideal mix of convenience, security and peace of mind.
Security
Eliminates worry of loss, theft or unauthorized use of ID cards
Dual authentication via PIN input standard with a wide degree of credential compatibility via factory options or by attaching any Wiegand-based reader
Allows customization of user-specific security levels, time zones, holidays and languages
Field-upgradeable memory options expand user capacity from 512 up to 32,512 users
Can be used indoors or outdoors with options for enclosure and heated platen
Efficiency
User verification method is more forgiving for lower reject rates than other biometric methods
Makes subtle template adjustments with each use
Low sensitivity to dirt on hands or dusty environments
User verification is confirmed in less than 1 second
Ideal for high traffic applications
Convenience
Quick installation and intuitive enrollment
Use as a standalone system or easily integrate into access control system
Ability to customize user-specific security levels, time zones, holidays and languages
Optional HandNet software enables HandKeys to communicate alarms and transactions in real time without access control system integration
Provides activity reports
On-site supervised user enrollment can occur at any networked unit with ability to create expiring visitor privileges
Request a Quote