Traffic control model IK-8190

$370.00

Uses

Traffic control; attendance; elevator control

Management settings

Touch screen management; CS system management; BS cloud system management; Application

Other interfaces

1 exit button; 1 interface port; 1 fire alarm input; 1 alarm output; 1 Wiegand input and output; RS4851 output; 1 USB; 1 lock control

 

Description

IK-8190 is an advanced system for access control, time and attendance, and elevator management. It uses facial recognition, palm scanning, QR code, Mifare card, password, and dual-frequency card (optional) technologies to enhance security.

The best access control

High capacity and accurate data recording

The device can store 20,000 faces, 20,000 cards, 20,000 passwords, 10,000 palm scans, and 20,000 QR codes. It can also store 1 million traffic records, 50,000 photos, and 10,000 system records, making it suitable for busy environments and large organizations.

The most professional access control

Advanced security with intelligent algorithms

This model uses advanced algorithms for face recognition, palm scanning, and QR code. In addition, it also supports mask detection, live detection, and helmet detection to provide greater security and prevent unauthorized entry.

Access control price

Durable design and quality screen

This device, measuring 22 x 87 x 179 mm and weighing 0.8 kg, has a metal body and durable tempered glass. The 5-inch IPS Full HD display has high resolution, making it easy to use.

Traffic control device price

Advanced camera and fast detection

This device features a 2-megapixel Sony HD camera that detects people from a distance of 0.3 to 3 meters. With a recognition speed of less than 0.3 seconds, entry and exit are performed without delay.

Traffic control purchase site

Fast performance and up-to-date operating system

This product uses a 1.2 GHz A7 quad-core processor and MAL400 II graphics card. With 256 MB DDR3 and 8GB of internal EMMC memory, it is fast and uses the Linux operating system, which can be updated via USB or OTA.

Traffic control purchase site

High connectivity and compatibility

This device supports Wiegand 26/34/66 protocols and can be connected to other systems via TCP/IP and WiFi.

Traffic control sales site

With advanced features and a rugged design, the IK-8190 is an excellent choice for organizations, companies, and high-traffic environments that require a fast, accurate, and secure system for traffic control and time and attendance.

Additional information
Weight 800 g
Dimensions 22 × 97 × 179 mm
Detection capability

2-frequency card

,

Face

,

Mifare card

,

Password

User capacity

10,000 palm scans

,

20,000 cards

,

20,000 faces

,

20,000 passwords

,

20,000 QR codes

,

20,000 users

Traffic history

1,000,000 records

,

10,000 system records

,

50,000 photo records

Algorithm

Card

,

Detection of liveness

,

Facial recognition

,

Helmet identification

,

Mask detection

,

Password

,

Scan QR code

Body material

Metal + tempered glass

Screen

5.5 inch IPS Full View HD Screen

Eyepiece camera

2 Megapixel HD Wide Dynamic Binocular Camera

Detection distance

0.3 to 3 meters

Working temperature

-10 ~ 70 degrees Celsius

Relative humidity

10 ~ 90 percent

Detection speed

<0.3S

Operating system

LINUX 

Operating system upgrade

Support OTG or USB disk upgrade

Communication methods

Configurable wifi

,

TCP/IP

پروتکل رابط

26/34/66 Wiegand 

CPU

Quad-core A7 1.2GHZ

GPU

MAL400 II

Storage capacity

1GB DDR3 +4GB EMMC

Working voltage

DC12V (9~14V)

Workflow

2000 milliampere

Reviews (0)

Reviews

There are no reviews yet.

Be the first to review “Traffic control model IK-8190”

Your email address will not be published. Required fields are marked *

Technical information
Register a question

Register a product inquiry

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Frequently Asked Questions
  • What are the main functions of the management panel in a smart lock?

1. Access Management: Through the admin panel, you can set different access levels and permissions for different people. For example, you can define different access levels for family members, friends, or employees and specify when and how each person can access the lock.

2. Lock settings: The admin panel allows you to set and change lock settings. These changes include setting a password or access code, scheduling settings, alert and notification settings, and other lock-related settings.

3. Recording entries: The admin panel usually records lock entries and allows for reviewing logs and traffic records. This helps administrators track activities such as people entering and leaving the system and make changes to their access levels if necessary.

4. Notifications and alerts: The smart lock admin panel can display notifications and alerts related to the lock. For example, an alert message can be displayed in case of failed login, unauthorized attempts, or entering an incorrect code.

 

  • How does the reporting system on a specific day work in the smart lock?

A specific day reporting system can be provided as a feature in the smart lock. This feature allows you to receive a smart lock traffic report on a specific day. For example, you may want to receive a traffic report on holidays, business hours, or other events.

Report Details: The reporting system typically includes information such as the time of entry, the identity of the person entering, the lock status (locked/unlocked), and the entry method (password, card, fingerprint) in the report.

Method of sending reports: The system sends reports to you. This can be done via email, SMS, mobile application, or by connecting to other management systems (such as an integrated building security management system).

 

  • Is there a threat warning system in the smart lock?

The threat warning system is another security feature of this product. The main purpose of this system is to warn the owner or other specified persons about the occurrence of a threat or an attempt to break into the home or place in question. Usually, a threat warning system includes components such as sensors and detectors, which notify the system by detecting events such as an attempt to break into, defining unusual patterns and unusual changes in the environment.

It should be noted that, depending on the existing settings, the threat warning system can notify you of this threat. This notification allows you to quickly respond to threats and security problems related to your lock.

 

  • How does 360-degree fingerprint scanning work in smart locks?

360-degree fingerprint scanning is a technology used to recognize and identify fingerprints. In this technology, the fingerprint is recorded from all angles and sides with high accuracy, so that all the details of the fingerprint, including lines, curves, and patterns, are accurately recorded.

Comparing the fingerprint with the pattern recorded in the 360-degree scanning system identifies the individual and matches it with the patterns recorded in the database. This technology is very accurate and secure and is used for security purposes and personal identification.

Applications of 360-degree fingerprint scanning include access keys to security systems, smart locks, mobile phones, banking equipment, and time and attendance management. This technology has attracted much attention due to its high speed and accuracy, reduced risk of fraud, and the absence of direct contact with the fingerprint surface.

360-degree fingerprint scanning is generally much more secure against fraud than older fingerprint scanning methods. However, no security technology is completely foolproof. Therefore, in order to reduce the possibility of fraud, 360-degree fingerprint scanning systems use advanced security methods. These methods can include thermal fingerprint recognition, detection of blood flow under the skin, detection of vital patterns (such as heart rate), or the use of other diagnostic technologies.

This method is used to increase the level of security because vital patterns are unique to each individual and it is difficult for an individual to forge these patterns. It can also be used in cases where a person's fingerprint information cannot be identified for any reason (such as wounds on the hand or the use of creams and chemicals).

 

  • How many types of live member detection and fixed sensor are there in a smart lock?

Smart lock systems typically use a combination of multiple technologies for live-organ detection and fixed sensors.

1. Fingerprint sensor: A fingerprint sensor is able to detect characteristics of a finger's vitality, such as blood flow in the arteries and the presence of moving tissue, using a fingerprint sample. This technology typically works using optical or creep sensors.

2. Ultrasonic fingerprint sensor: This technology uses sound waves to capture an image of a fingerprint. The sensor can distinguish between live and non-live fingerprints by looking at the difference in how the sound waves interact with the outer surface of the finger.

 

  • Is there an anti-shock system in the smart lock?

The anti-shock system in smart locks is designed to protect these locks from sudden impacts and shocks. In this system, the lock is made using special electronic and mechanical components that are capable of absorbing and withstanding sudden impacts and shocks.

Using an anti-shock system, a smart lock can withstand sudden impacts and shocks such as slamming the door, hitting the lock, and electrical shocks. This system is usually designed using various technologies such as accelerometer sensors and shock response detection systems.

The use of an anti-shock system in smart locks is used to increase resistance to shocks, increase security against unauthorized attempts to open the lock, and increase the useful life of the lock.

 

  • What is a multi-function anti-theft locking system?

The Multi-Purpose Anti-Theft Locking System is a type of smart lock used to increase security and prevent theft. In addition to the traditional lock, this system incorporates tabs in other directions to increase security and efficiency in preventing theft.

Physical resistance: The multi-purpose anti-theft locking system is usually made using special, durable materials to withstand impacts and physical attempts to break it.

 

  • What does the remote control do in a smart lock?

The remote control in a smart lock performs several functions. These functions may vary depending on the type and model of the smart lock, but in general, the remote control in a smart lock has the following functions.

1. Unlocking and closing the lock: The remote control allows you to open and close the lock by pressing specific buttons on the remote control without the need to use physical keys or a password.

2. Security features: Some remote controls have security features that limit the possibility of duplication. This means that the remote control is designed to be non-duplicatable, preventing unauthorized access to the lock.