- Access Control System 門禁系統 (325)
- Access Point WIFI系统 (41)
- Automation System 自動化系統 (26)
- Burglar Alarm System 防盜系統 (119)
- CABD / SMATV System 公共天線 / 衛星天線系統 (90)
- CCTV System 閉路電視系統 (1469)
- Electric Fence 防盜電網 (202)
- Intercom System 內線對講系統 (64)
- PABX System 電話跳線系統 (64)
- Public Address System 公共廣播系統 (301)
- Video Doorphone System 視像對講機系統 (120)
"HID"C1100 Series,Crescendo®
C1100 Series
The Crescendo® C1100 is a credit card-sized smart card for strong authentication and physical access control. It provides a multi-application and multi-technology platform designed to address a variety of enterprise and government deployments requiring a generic, converged smart card. Offering out-of-the-box, standards-compliant support for network and computer access (login to workstations and laptops or web-based applications requiring cryptographically protected operation), the C1100 is a cost-effective solution that also eliminates the need for the cardholder to carry multiple credentials or remember multiple passwords and PINs. The C1100 can also be used as an employee ID badge as well as for access control to buildings. The cards are available in a variety of RFID interfaces to accommodate the majority of physical access control requirements, ensuring maximum interoperability with existing and future deployments. The smart card is ideal for organizations seeking a white card to use with ActivID® card management system (CMS) or by any third- party CMS. ActivID CMS provisions the cards with an electrical profile interoperable with a variety of applications such as Personal Identification Verification (PIV) and Commercial Identity Verification (CIV), Microsoft-based applications as well as ActivClient®, naviGO® and 4TRESS®. The Crescendo C1100 is interoperable with the HID Global's open and portable ActivIdentity® Applet Framework for Javacard-based devices. This framework delivers standard-based services for password protection, digital identity credentials for signature and encryption, cryptographic functions based on symmetric and asymmetric keys, personal information and network access.

