Shenzhen Newbell Electronics Co., Ltd.
Kuæa>Proizvodi>Lööŋ ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈n
Lööŋ ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈n
Neubel Prison Access Control System ee kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye
Detalji proizvoda
Framework ye:
Në ye mɛn, ɣön ye kɔrɔ̈ɔ̈ŋ, ɣön ye kɔrɔ̈ɔ̈ŋ, ɣön ye kɔrɔ̈ɔ̈ŋ, ɣön ye kɔrɔ̈ɔ̈ŋ, ɣön ye kɔrɔ̈ɔ̈ŋ, ɣön ye kɔrɔ̈ɔ̈ŋ, ɣön ye kɔrɔ̈ɔ̈ŋ, ɣön ye kɔrɔ̈ɔ̈ŋ, ɣön ye kɔrɔ̈ɔ̈ŋ, ɣön ye kɔrɔ̈ɔ̈ŋ Sisitɛm kënë bï kɔc cï röt looi ya tɔ̈ɔ̈u ku kɔc cï röt looi ya tɔ̈ɔ̈u. Ka tɛmɛ tɛmɛ tɛmɛ tɛmɛ tɛmɛ tɛmɛ tɛmɛ tɛmɛ tɛmɛ tɛmɛ tɛmɛ tɛmɛ tɛmɛ tɛmɛ tɛmɛ tɛmɛ tɛmɛ tɛmɛ Në ye mɛn, ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän ɣän
System topology:
1.Permits management: System permissions management classification is clear and clear, user permissions setting is flexible. 1.Permits management: System permissions management classification is clear and clear, user permissions setting is flexible. 1.Permits management: System permissions management classification is clear and clear, user permissions setting is flexible. Y'a lëu ba kɔc dɔ̈ɔ̈r ye kɔc dɔ̈ɔ̈r ye kɔc dɔ̈ɔ̈r ye kɔc dɔ̈ɔ̈r ye kɔc dɔ̈ɔ̈r ye kɔc dɔ̈ɔ̈r ye kɔc dɔ̈ɔ̈
2.Time period management: a lëu bï raan dɔ̈t ya tɔ̈ɔ̈u në dhɔ̈ɔ̈r dɔ̈t yic, ka tɔ̈ɔ̈u në dhɔ̈ɔ̈r dɔ̈t yic, ka tɔ̈ɔ̈u në dhɔ̈ɔ̈r dɔ̈t yi
3. Real-time extraction: raan luɔi alëu bï ya tïŋ në real-time, ku bï ya tïŋ në controller yic, ku bï ya tïŋ në computer database yic.
4. Online / offline operation: System can be in network normal conditions, network operation, real-time monitoring management, data automatic collection / upload, automatic monitoring of network status. 4. online / offline operation: system can be in network normal conditions, network operation, real-time monitoring management, data automatic collection / upload, automatic monitoring of network status. Koo tɛ̈n yenë kɔmputɛɛr software ku kɔmputɛɛr ye tɔ̈ɔ̈u, ka tɛ̈n yenë kɔmputɛɛr ye tɔ̈ɔ̈u ka tɔ̈ɔ̈u ka tɔ̈ɔ̈u ka tɔ̈ɔ̈u A tɛmɛ lɔnadɛ̈ lɔnadɛ̈ lɔnadɛ̈ lɔnadɛ̈ lɔnadɛ̈ lɔnadɛ̈ lɔnadɛ̈ lɔnadɛ̈ lɔnadɛ̈ lɔnadɛ̈ lɔnadɛ̈ lɔnadɛ̈ lɔnadɛ̈ lɔnadɛ̈.
5. Remote Open Doors: Administrators can click the "Remote Open Doors" button on the software interface to remotely open the developer requested door. 5. Remote Open Doors: Administrators can click the "Remote Open Doors" button on the software interface to remotely open the developer requested door.
6.Forced open/close doors: You can set some doors to normal open, and some doors to normal closed by software.
7. Kuen de kɔc tɔ̈u: Kuen de kɔc tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u t
8. Card + Password: Ni aw ye kaar ye kɔn keyboard ye kɔn keyboard ye kɔn keyboard ye kɔn keyboard ye kɔn keyboard ye kɔn keyboard ye kɔn keyboard ye kɔn keyboard ye kɔn keyboard ye kɔn keyboard ye kɔn keyboard ye kɔn keyboard ye kɔn keyboard
9.Real Time Monitoring Display Door Status: You can monitor all door swiping conditions and entry and exit conditions in real time, you can show real time the swiper's photo stored in the computer, so that security personnel and myself check. 9.Real Time Monitoring Display Door Status: You can monitor all door swiping conditions and entry and exit conditions in real time, you can show real time the swiper's photo stored in the computer, so that security personnel and myself check. Na cɔl magnetic signal line, raan ye luui bɛ̈n lëu bɛ̈n ŋäc tɛ̈n cɔl open and closed door.
10.Doors don't close alarm for a long time: Doors are open for a long time (time-out time can be set) forget to close the door, system software monitoring interface will use red to indicate the alarm information at the time and location, and drive computer speakers to remind the duty personnel of attention (can be local or remote alarm).
11. Alarm de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar de kaar
12. Lɔ̈ɔ̈i de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor de koor
13. Lɔ̈ɔ̈i / Lɔ̈ɔ̈i / Lɔ̈ɔ̈i / Lɔ̈ɔ̈i / Lɔ̈ɔ̈i / Lɔ̈ɔ̈i / Lɔ̈ɔ̈i / Lɔ̈ɔ̈i / Lɔ̈ɔ̈i / Lɔ̈ɔ̈i / Lɔ̈ɔ̈i Software ye tɛ̈n yenë yen tɛ̈n yenë yen tɛ̈n yenë yen tɛ̈n yenë yen tɛ̈n yenë yen tɛ̈n yenë yen tɛ̈n yenë yen tɛ̈n yenë yen tɛ̈n yenë yen tɛ̈n yenë yen tɛ̈n yenë yen tɛ
14.Emergency shutdown/one-button lock: function no need software setting, just connect the emergency switch to the controller's specific wiring point (emergency entry), when a emergency occurs, press the emergency switch, then the controller's governed doors are closed, press the button, swipe card can't open the doors. A tɛ̈n ye raan dɛ̈t ye kɔc dɛ̈t ye kɔc dɛ̈t ye kɔc dɛ̈t ye kɔc dɛ̈t ye kɔc dɛ̈t ye kɔc dɛ̈
15. Alarm de kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc ye kɔc Në ye mɛn, kɔmpiöta ye jam në kɔmpiöta ye kɔmpiöta ye kɔmpiöta ye kɔmpiöta ye kɔmpiöta ye kɔmpiöta ye kɔmpiöta ye kɔmpiöta ye kɔmpiöta ye kɔmpiöta ye kɔmpiöta ye kɔmpiöta ye kɔmpiöta
16.Electronic map real-time monitoring: doors controlled each install detector (such as door magnet etc.), equipment real-time networking, can be through software real-time showing door status (such as normal opening, closing, unusual opening, timeout closing doors etc.) in the electronic map interface, achieving each doors real-time map monitoring function.
17.Can be extended to external verification receiving equipment: according to actual needs can be extended to external keyboard reading head, user can be verified through swipe + password, password and so on. 17.Can be extended to external verification receiving equipment: according to actual needs can be extended to external keyboard reading head, user can be verified through swipe + password, password and so on. External fingerprint identifier, user pass through the fingerprint biometric verification method; ye raan ye luui ye raan ye luui ye raan ye luui ye raan ye luui ye raan ye luui ye raan ye luui ye raan ye luui ye raan ye luui ye raan ye luui External face recognition device, so that users need to perform face recognition verification method pass. Kɔn ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan Iris, palm print, venometer, raan ye luɔ̈ɔ̈i adhil bɛ̈n looi bɛ̈n looi bɛ̈n looi bɛ̈n looi bɛ̈n looi bɛ̈n looi bɛ̈n looi.
18.Connected video surveillance: function can be achieved in real time video surveillance function or image grabbing function based on the users and the site's actual needs, through the access control system and the video surveillance system hardware or software. function can be achieved in real time video surveillance function or image grabbing function based on the users and the site's actual needs. function can be achieved in real time video surveillance function or image grabbing function based on the users and the site's actual needs. function can be achieved in real time video surveillance function or image grabbing function based on the
Lɔ̈ɔ̈i ë luɔɔi ë luɔɔi ë luɔɔi ë luɔɔi ë luɔɔi:
1, Intelligent Integration: Sisitɛm ye IoT-ye tɛ̈n yenë kɔc ye tɛ̈n yenë kɔc ye tɛ̈n yenë kɔc ye tɛ̈n yenë kɔc ye tɛ̈n yenë kɔc ye tɛ̈n yenë kɔc ye tɛ̈n yenë kɔc ye tɛ̈n yenë kɔc ye tɛ̈n yenë kɔc ye tɛ
2, baara duniŋ: raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan Kawɛ̈ɛ̈r ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈n ye kɛ̈ Function settings are different, such as double door interlocking, password opening, central confirmation, super password opening door etc., you can set it free, free combination. Function settings are different, such as double door interlocking, password opening, central confirmation, super password opening, etc., you can set it free, free combination. Alarm link, fire link, can be varied combinations, more scientific rational. Alarm link, fire link, can be varied combinations, more scientific rational. Alarm link, fire link, can be varied combinations, more scientific rational. Alarm link, fire link, can be varied combinations, more scientific rational.
3.Easy to use: good human-machine interface, software system has a good learning type and operational. 3.Easy to use: good human-machine interface, software system has a good learning type and operational. 3.Easy to use: good human-machine interface, software system has a good learning type and operational.
4, luɔɔi ye luɔɔi: kɛ̈ɛ̈l ye kɛ̈ɛ̈l ye kɛ̈ɛ̈l ye kɛ̈ɛ̈l ye kɛ̈ɛ̈l ye kɛ̈ɛ̈l Real-time voice prompt, map animation display, window pop-up link, ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan ye raan.
5, gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam ye gam Data tɔ̈ɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u tɔ̈u
6, luɔ̈ɔ̈i de gël: a lëu bï kɔc juëc ya tɔ̈ɔ̈u, a lëu bï kɔc juëc ya tɔ̈ɔ̈u, a lëu bï kɔc juëc ya tɔ̈ɔ̈u, a lëu bï kɔc juëc ya t
7, Upgrade nɔgɔ: Sisitɛm ye luui modular design method, ye nɔgɔ ye tɛ̈n tɔ̈ɔ̈u ka tɛ̈n tɔ̈ɔ̈u ka tɛ̈n tɔ̈ɔ̈u.
8, scalability: system modular design, easy to upgrade maintenance; 8, scalability: system modular design, easy to upgrade maintenance; 8, scalability: system modular design, easy to upgrade maintenance; 8, scalability: system modular design, easy to upgrade maintenance; API interface, a lëu bɛ̈n tɔ̈ɔ̈u në platforms kɔ̈k yiic; A kɛnɛya bɛ̈n bɛ̈n bɛ̈n bɛ̈n bɛ̈n bɛ̈n bɛ̈n bɛ̈n bɛ̈n bɛ̈n
9, tɛ̈n yenë yen tɔ̈ɔ̈u thïn: kaar ye kɔc tɔ̈ɔ̈u thïn ka tɔ̈ɔ̈u thïn ka tɔ̈ɔ̈u thïn ka tɔ̈ɔ̈u thïn ka tɔ̈ɔ̈u thïn ka tɔ
10, wɛ̈t juëc: RS485, RS422, RS232, TCP/IP ku wɛ̈t juëc.

Kategori Produk

Model Produk

Karakteristika Produk

Main Equipment

Controller duëël tök

CHD805AE-E

Luɔi ye kɛ̈ɛ̈r, ye kɛ̈ɛ̈r ye kɛ̈ɛ̈r ye kɛ̈ɛ̈r ye kɛ̈ɛ̈r

Controller duël

CHD806D2-E

Luɔi ye kɛ̈ɛ̈r, ye kɛ̈ɛ̈r ye kɛ̈ɛ̈r ye kɛ̈ɛ̈r ye kɛ̈ɛ̈r

IC Password Keyboard Reader

CHD602PM

Luɔi stabil, tɛmɛ

IC Card Reader

CHD602FM

Luɔi stabil, tɛmɛ

Equipment ye kony

Button de sortie

CHD-EP66

Touch sensitive, durable

Issuer

CHD603BM-U

USB interface, kaar ye gam

Power Supply

CHD-PS212

High efficiency conversion, anti-interference strong

Plug Lock

CHD-CE200

Gɛɛr dɔɔni, tɛmɛ dɔɔni

Magnetic lock dup tök

CHD-CM280H1

No noise, 280 kg pull

Dual door magnetik lock

CHD-CM280H2

No noise, 280 kg pull

Software Management

IMS7S

Intelligent Integration, Powerful

Nanguanling Prison, Liaoning

Jail Yiwu

Shandong Chateau Jail

Shandong Jining Penitentiary

Liaoning Province Lingyuan 五监

Liaoning Province

Kɔnyim Second Prison

Liaoning province Lingyuan 二监

Kɔɔr de Nantai, Liaoning

Li Jin County, Shandong

Hubei Xianning Prison

Lu Shun 一监, Liaoning

Zhejiang Province 2nd Prison

Zhejiang Province Josi Prison 8th Division

Sand Bear Watchtower Jail

Zhejiang Province Josi Prison 7th Section, Zhejiang Province Josi Prison 7th Section, Zhejiang Province Josi Prison 7th Section, Zhejiang Province Josi Prison 7th Section

Zhejiang Province Josh Prison

Zhejiang Province Josi Prison First Division

Nanhu Prison, Zhejiang

Jinhua Prison, Zhejiang

Fuhai Jail, Xinjiang

Guangxi North Sea Prison

Xinjiang Penitentiary ka 5

Proyek Luɔi Xinjiang

Dalian Nanguanling Prison

Shenyang Kangping Prison

Dalian Liaonan New Prison

Climbing Branch Labor Education (Judicial Command) Institute

Dalian Liaoxi New Prison

Shenyang yam tɔ̈ɔ̈u

Bɛ̈ɛ̈ɛ̈r de Liaoning

Liaoning<unk>顺二监

Kɔl kɔl

Liaoning Women's Prison

Dalian Liaonan New Prison

Jinjiang Women's Prison (Jinjiang Women's Prison)

Zhejiang County Fourth Prison

Zhejiang Province 6th Prison

Tianjin River West Prison

Taizhou Linhai Penitentiary

Shikawa Jail

Chaidami Jail

Zhaocheng Jail, Shandong

Lingyuan Sanju

Panjin Jail

Liaoxi acï bɛ̈n tɔ̈ɔ̈u

Luɔ̈ɔ̈i (Add)

Liaoning二监

Qinyi Prison, Guizhou

Zhejiang Jail, Shandong

Xincang Jail, Shandong

Ruxi Prison, Shandong

Weibei Prison, Shandong

Liaoning Women's Prison

Kɔmping Jail (Added)

Lingyuan 5th Jail (Added)

Panjin Jail

Proyek de Intelligence de Nanling Prison

Xinjiang Ingesha tɛ̈n

Nanling Public Security Bureau tɛ̈n

Shandong Juno Prison

Yu City Prison, Shandong

Jining Prison, Shandong

Jinxiang Prison, Shandong

Shandong Fei County Prison

Shanxi Yangquan tɛ̈n

Онлайн разпит
  • Kontakti
  • Kompanija
  • Telefon
  • E-mail
  • WeChat
  • Kod provjere
  • Сједност поруки

Uspješna operacija!

Uspješna operacija!

Uspješna operacija!