Intelligent touch screen access terminal

November 2017 Access Control & Identity Management, Integrated Solutions

Johnson Controls has introduced its multi-functional Software House TST-100 Touchscreen Terminal, providing an enhanced end-user experience at the door. With an intuitive touch screen user interface, native intrusion functionality and compatibility with both legacy and IP-based door controllers from Software House, the TST-100 Touchscreen Terminal adds value to the access control system by allowing users to have more flexibility and control at the reader level.

The TST-100 features a large, 4.3-inch graphical LCD touch screen that displays a range of colourful icons and custom command menus, providing end users with quick and easy feedback of the access control operation, and allows guards and other individuals the ability to easily arm and disarm intrusion zones and issue custom commands directly at the door.

Built using the HID Global 5127 Mini multi-technology read head, the Touchscreen Terminal supports a range of highly secure smartcard technologies, including HID iCLASS SE and iCLASS Seos. It uses high-speed encrypted RS-485 for secure communications to an IP controller, making it ideal for healthcare facilities, educational facilities, airports and other critical security environments where network connectivity directly to a reader on the unsecure side is not allowed.

“The TST-100 Touchscreen Terminal hits several targets of multi-functionality, advanced security and ultimate usability all within a sleek, user-friendly touch screen interface,” said Rafael Schrijvers, access control product marketing manager, EMEA, Building Technologies & Solutions, Johnson Controls.

The TST-100 also offers intrusion functionality at the door without the addition of an intrusion interface, allowing end users to view arm/disarm intrusion zones on the device. A command menu provides end users with the ability to issue custom key commands to the intrusion system as well. The reader’s programming includes Johnson Controls’ Reliable Messaging (RM) protocol that facilitates compatibility with any iSTAR door controller.

The Touchscreen Terminal can be added to any Software House platform, including the C•CURE 9000 Security + Event Management system, and can also be integrated with the victor Unified Client. The TST-100 includes the IP-based Ethernet Access Control Door Module (IP-ACM), which when installed near the doors it controls, establishes secure IP, network-based communications with iSTAR door controllers using cyber-secure AES encryption. The Touchscreen Reader’s IP-ACM door module also includes Power-over-Ethernet (POE) capability, helping to lower installation costs.

For more information contact Johnson Controls Security Products, +27 (0)82 566 5274, emallett@tycoint.com, www.tycosecurityproducts.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...