i-Key4 has - Long Range Vehicle Access
Void and Validate i-Key 4 in your access control system just like a prox/smart card!
 

Connects to an Access Control System just like a prox / smart card Reader!
Just one product and with the touch of a button, the i-Key 4 is the smart and simple way to control access to your secure areas such as boom gates, rising barriers, roller shutters and doors. Cutting edge technology allows the i-Key 4 to enter multiple facilities with just one key. Use the i-Key 4 and your secure access couldn't be simpler!

Easy Links
i-Key Product Range
Download the PDF
 
Enhanced Flexibility
Combine the convenience of long range access control with the simplicity of close range proximity readers with i-Key 4 pendants. i-Key 4 supports technologies such as HID®, Indala®, EM, Farpointe Data® / Keri Systems® proximity along with iCLASS®, Mifare® and Tecom® / GE®smartcard technologies to work just like a prox / smart card.
 


:: View Product Range
i-Key 4 can also be ordered as a Prox or Smartcard ready so it can easily work as a standard proximity or smartcard. Optional Prox or Smartcard formats include, HID, Indala, EM, Mifare or i-Class.

i-Key 4 Overview

i-Key 4 pendants provide a safe and simple way to control access to any facility. When a button on the pendant is pressed the unique pendant number and site code are sent securely via Radio Frequency to the receiver to be decoded. Once decoded the code is transferred to an access system via the industry standard wiegand protocol.

i-Key 4 pendants have four separate buttons, each button is linked to a separate wiegand output on the i-Key 4 receiver, so one button could be used for a gate and another for a door etc.

Because each pendant may be uniquely site and code numbered they can be easily be added or deleted by the access control system just like a Prox Card!

Security
i-Secure technology provides an added layer of security to your Access Control System. i-Secure technology is used to encode the i-Key pendant and receiver with a unique customer code, so card information only gets passed to the Access Control System when the customer codes both match. The result of this is an Extremely High Security system that also eliminates spurious card information being passed to the access system which is common place on less secure technologies. Ultra High Security can be provided by linking i-Secure and a custom facility for your site and customers.

 
ISCS Home | Company | Downloads | How to Order | Contact ISCS - Copyright 2008 - International Security Control Solutions Pty. Ltd. ABN 57 079 314 417