Do you have a question about the RFIDeas pcProx and is the answer not in the manual?
Type | Contactless card reader |
---|---|
Interface | USB |
Technology | RFID |
Frequency | 125 kHz |
Supported Cards | HID Prox |
Operating Systems Supported | Windows, Linux |
Details the rights and limitations for using the software portion of the product.
Outlines the specific rights granted to the user for the software.
Specifies restrictions such as reverse engineering, separation of components, and rental.
Procedure for returning products for warranty service, including RMA process.
Legal notice regarding ownership and prohibition of reproduction.
Discussion of various output choices available for pcProx proximity readers.
Explanation of proximity activated identification systems and their use.
Details the two primary modes of operation for the USB pcProx reader.
Details the two primary modes of operation for the RS-232 pcProx reader.
Rationale for using proximity identification systems for security and access.
How proximity readers eliminate manual entry errors and improve accuracy.
Comparison of magnetic stripe technology reliability versus proximity technology.
Explanation of the basic functionality of the proximity identification system.
Identifies types of companies or institutions that benefit from the system.
Lists the components typically found in the product kit.
Specifies the hardware and software requirements for installing the system.
Description of the passive badge and its reading capabilities.
Details the various configuration settings available to the user.
Option to connect the configuration application to the device's internal storage.
Configuration of facility and ID codes, including parity and extra characters.
Configuration options for the reader's LED indicators (Red/Green).
Information regarding the attachment and identification of multiple USB readers.
Setting unique addresses for readers to allow selective communication.
Options for operating the reader in SDK mode for developers.
Function to retrieve card data, particularly when used with the SDK.
Overview of bit formats and their structure in proximity cards.
Explanation of the leading and trailing parity bits in card data.
Description of the facility code portion of proximity card data.
Description of the identification code portion of proximity card data.
Guide to determining card format and setting up masking rules.
Introduction to using the reader for log-on and automatic password entry.
Description of the configuration program for setting up the reader.
Key issues for administrators regarding log-on security policies.
User actions required for password setup and changing.
Process for changing user passwords using the proximity reader.
Description of the system operation during the login process.
Methods to enhance security against lost or stolen proximity tokens.
Description of one-factor authentication using the proximity reader.
Description of two-factor authentication using the reader and PIN.
Measures to protect card data from unauthorized access.
Steps to resolve issues when the reader is not detected by the system.