User management / Identification
Managing security, identification of employees, release of different operating levels, data acquisition, protection against unauthorized access.
The use of user management and identification systems makes it possible to protect machines from unauthorized access. They offer the possibility to enable or restrict various operating levels for different users or to track which settings have been adjusted by which user.
We usually support readers for contactless data exchange via RFID (Radio-Frequency IDentification) or NFC (Near Field Communication). Of course, all common identification systems can be supported.