Posts Tagged ‘ IDTECK ’

How to Wire an IDTECK iEDC Control Board – 8 Door Access Control

Written By:
Thursday, December 11th, 2014

In this article I will explain how to wire Access Control Readers, Mag locks and other I/O Devices to the IDTECK iEDC 8 Door Access Control Board, model number ACP-iEDC.

This board is a combination of our ACP-iFDC (4 Door) Board and an Expansion Board (ERIO).

Lets take a look at the board and some of the I/O ports. This will help us to determine and understand the acronyms and in where these ports are located.

IDTECK  iEDC I-O ports

Based on the table above, this 8 door access control board provides a variety of inputs and outputs we can use to control our facility. One of the coolest thing about this access control board is the ability to power up the board with a POE switch 802.3at. You could basically power up the readers at least and have the mag locks power up separately (recommended).

The access control reader I will be using for this demonstration is the ACR-RF10. The ACR-RF10 is an Indoor/Outdoor Access Control Proximity Reader. The communication data is 26 Bit Wiegand, and is manufactured to fit on the frame around a door, but it can also be wall mounted.

You can use a variety of our Proximity Cards and tags with this reader. Keyfobs/Stick on Tags will register up to 2 inches away. Slim Proximity Cards will work up to 2.75 inches and our Clam Shell Cards up to 4 inches away.

Another great feature of this Board is the ability to be accessible through the WEB. I will be covering this point a bit later.

Lets take a look at the reader wires and determine the colors we need to use:

Access Control Reader wiring

Reader connections

Notice on the picture above the wires you will find in this reader will be as follow:

1- Red (positive)

2- Back (negative)

3- Green (D0 – Wiegand)

4- white (D1 – Wiegand)

5- LED

6- Buzzer

This is how the wires need to be connected to this board. As you can see, the reader is being powered by the board itself, so it is safe to use the POE+ to power the board and power the readers. The reader’s power requirements is 150mA ea.

To connect the mag lock it is necessary to use external power for the lock itself. Connect the positive wire from the lock to the RNC1 port (Relay Normally Close). Do the same thing for each of the locks. If using multiple locks then connect the positive wire from it to RNC2, RNC3 and so on. Connect the negative wire of the mag lock to the negative terminal of the external power supply we are using, and then connect a positive wire from the external power supply to the COM terminal of your board. Use jumpers from the COM terminal to the other COM terminals, therefore you will be able to provide power to other relays from that external power supply.

Lock wiring

NOTE: Make sure you always use diodes to protect the board in case of power issues. Follow up the diagram above for diode installation and wire connections to the board.

Connecting a door contact and push to exit button is very simple. This board will have a total of 16 inputs to which each if them is represented with input number

For example: Input 1 will be labeled GND follow by Input_1. This first port will be for the push to exit button. The following port will be for a door contact and it will be labeled GND following by Input_2, and so on. In theory it will be 2 ports per door for a total of 16 ports.

Door contact and exit

This concludes the process of wiring some of the basic devices to the board.

NOTE: If you would like to daisy-chain these boards together on the same network, it is required to assign a unique address to each board to avoid communication problems. Below you can see the dipswitch configuration and location in the board.

ID unique address

When installing several of these boards, each iEDC board most be grounded properly to prevent any power differences when fluctuation occurs. Connect each of the GND terminals (12VDC port only) together. See figure below:



How to Install Access Control Software Standard Server Version from IDTECK

Written By:
Wednesday, September 3rd, 2014

Access control is the ability to allow or restrict access to a place or to have the ability to deny or allow the use of a resource. The idea behind this is to control certain users and resources at a specific place so there is full control of how, when and where the resource is utilized.

Access control can be done manually or completely automatic, but how would you keep track of who, when, and how the resource was accessed? The short answer to that is Access Control Software.

Many access control devices are network capable, which means that they can be accessible over a web browser or through a software via TCP/IP. These devices can also have a Web Service Interface that can show you basic information such as logs, alarm events, etc. Most of these devices that have that capability are very limited on the things you can configure.

Every access control is different in the way they might require a specific set of settings to successfully connect with the main software. In this demonstration I will be showing you how to configure the Standard Version of IDTECK’s Access Control Software.

This software will require 2 sets of programs and setups. One is the server communication and the access control software itself. It is necessary to install SQL for the database of the software so it will be easy to export any database with settings later on. SQL Express comes with the Standard version for free so there is no need to acquire a greater version, unless there is a necessity to have advance settings on SQL. Other than that it should be straight forward.

NOTE: To make sure the installation runs smooth make sure that the following requirements are met:

1.- Windows 7 x32 or x64 bit
2.- At least 10GB of Space on your Hard Drive
3.- Make sure no other SQL Instance is running on your PC
4.- Minimum of 4GB of Ram and a Dual Core Processor with at least 2.00 Ghz.

Software installation

Download the Server version of the software from here:

Double click on the icon and proceed to install the software. Follow the prompt and install all of the necessary updates until you get to the section where you will need to named the Instance. See picture below

IDteck SQL Instance

After naming the instance of your SQL installation you have to make sure you remember the password because this will be required to configure the communication server. Click Next and the SQL process will begin by decompressing the files and preparing the installation process. When done, the following window will appear:

Customer Info

Type a name and a company name to continue the installation. Select all of the features on the list and click Next.

Database Selection

On this section make sure the database server is typed as shown in the picture above. Select SQL server authentication and use the following default username and password (sa) and (1234). Note: If you change the password then you will need to type that info under the password field. Click Next to begin the installation process:

SQL Finish Installation

Click Next to begin the installation. Check the following picture summary to make sure you have all of the SQL features that will be installed.

SQL Copying Files

When the installation is completed, the following 2 icons will appear on your desktop. These icons are essential to the software and a few more adjustments need to be made before we fire up the communication server.

Idteck Comunication and server

The next step is to make sure we have the software executed with administrative rights. To do this, right click on each icon and click on the compatibility tab, then select the “Run this program as an administrator”.

Run As

Double click on the IDTECK communication Server to begin configuring its settings:

Server Settings

After the software launches, click on server setup and the following settings will show as the picture above. Click on the Server IP and make sure that the IP is your computer name\IDTECK. The Database name will be STARWATCH_STD. Username is “sa” and password is “1234”. Authentication should be DB Authentication.

Note: if you change this (username and password) when installing the software then you will need to input the right information. Click OK when done and the result should be as show in the picture below:


Double click on IDTECK STANDARD Server Icon and input the username and password. The default username and password is admin.

Software login

After all this the software will open up and will display the following interface. From here we can prepare the software to communicate with the device you are trying to manage.

IDteck Software Interface

Note: This software is free with a limit of users and doors that can be run without a license. A pop-pop will show after the software is launched:



Notice that because the software doesn’t have a device configured in it, the software will display certain errors. See picture below for reference.

No Comunication

To add a device go to “Device Setting Wizard” to configure the Default Site settings. Click the checkbox labeled “Whether to use” and click on the “Site Setting” button. A site settings box will display for you to type the communication server  IP address. The IP address will be the one your computer have. You can find out what IP address your PC have by going to command prompt and execute the ipconfig command.


Site Settings



At this point you will need to follow the steps to build your database for your access control and configure the connections between the software and your access control equipment.

For more information about this software play the video below to see a quick video demonstration of the operations and configurations of this software.


Access Granted – Introduces Access Control

Written By:
Friday, August 8th, 2014


Recently, here at TechPro Security Products, we have introduced a new line of Access Control products. We have teamed up with IDTECK, one of the biggest names in the security industry. IDTECK is a big security company based out of Seoul Korea, specializing in their top of the line access control systems. Established in 1989 IDTECK has come a long way from introducing their first explosion proof RF reader in 1995, to starting their research in biometrics in 2005, into becoming the leader in the access control industry today. They have made some great accomplishments and now you can order their products here in the states on

There are people who think their camera system is enough, although sometimes that may not be the case. Security Cameras may only prevent 75% of break-ins, while access control will prevent over 90%. Also, keep in mind that access control is much more than just swiping a card on a reader and gaining access to a door. It can mean gate access. Say you live in a gated association and when you press a button to make the gate go up and drive in. Or in some cases you may not even have to press a button, it may be automatic when you come within 50’ of the reader. Offered online are several long range readers so whenever you get close enough to said reader access is granted. This comes in handy for various reasons like long range access control, hands free identification, personal tracking, and parking control.

When it comes to general access control such as scan a card and gain access, or even using some kind of biometric readers to gain access to a door, we have you covered. 4 doors, 8 doors, or 32 doors its all here. Using the iFDC, which is a 4 door access control panel, you can control up to 4 doors using the iFDC boards and 4 standard card readers or proximity readers. 100,000 users are supported, and also the unit can be powered through PoE (Power over Ethernet). There are 8 relay outputs to handle things like your maglocks, strobes, or sirens. Also 8 inputs to handle your door sensors or exit buttons. This system is the most ideal system offered for a 4 door access control system. When it comes to 8 door access control we have the best system offered today, our iEDC 8 door access control package is the most reliable package on the market. There are a total of 16 relay inputs and outputs for your maglocks, door sensors, strobes, sirens, and exit buttons. Basically the same thing as the iFDC 4 door package but doubled. Still PoE capable, and also both the iFDC and iEDC have embedded web servers. Also the iEDC offers what is called a Duress mode, this is a function that can save someones life and possibly save you a lot of money in stolen or damaged property. An example of how it works is, a woman may be more vulnerable to a masked man trying to gain access to a building said woman has access to, well if she swipes her card and enters a PIN into the keypad she has just alerted either the security department in the building or the proper authorities outside of the building. This is an excellent feature to help ease the mind of an employee that may or may not be in harms way.

Also, Time and Attendance is a big deal of access control. This allows business owners to monitor the coming and going of employees. We offer a time and attendance management software that will allow you to manage simple payroll such as time in and time out, or advanced which allows you to monitor your employees time off for break and so on. This software works with most of our packages so this way small business or big business you are covered. If you have an employee that takes too many smoke breaks and is hard to prove he is smoking more than working this is a more than effective way to solve the issue. If you have an employee showing up late or too early and don’t want them to go over there hours this is a efficient way of managing your payroll issues.

All of these things could not work if was not for the most vital part of the system. Your readers and your cards. Forget your card and you are stuck in some cases, or something happens to your reader and all the software in the world can’t help you. This is why we have such a variety of readers and cards.

Starting with the readers, we offer a wide range of proximity readers that are weather proof. They can handle anywhere from 4 inches to 12 inches of read distance depending on the model. For example our ACR-RF10 can read a proximity card or smart card up to four inches away. Then on the other hand the ACR-RF30 can read the cards up to 12 inches away. We also offer a vandal proof series of readers. These are proximity card and smart card readers that are for lack of better term destruction proof. Although we DO NOT know what would happen if it was shot with a gun, we do know however that it is safe from people smashing it with a hammer or painting over the numbers if it is a keypad. These are a lot heavier to hold in your hand than normal readers so it is easy to see that they are indeed vandal proof.

Now, we have a few different cards all do relatively the same things. The most popular would be the clam shell cards. We offer a printable and a non-printable version of this card.  We also carry a keyfob that may be easier to carry around and be more accessible. The sticker card is something that would be ideal for someone who doesn’t want some extra thing they have to carry it around. You can stick it to the back of your phone or something along those lines. And then there is the long range card that is compatible with our long range readers mentioned earlier.

There are several things that go into making an access control system work the way you need it too. Here at we have everything you need to make it happen. Just remember while your security camera system may be a deterrent to intruders, there may be just one person that decides he/she can still get away with it. While this may be true, if you had an access control system you wouldn’t have to worry about that because he/she would not be granted access. There are several reasons why one of these systems should be in place, what ever yours may be give us a call at 866.573.8878 or check us out online at


What is an Access Control Smart Card?

Written By:
Thursday, June 19th, 2014
Smart card

Smart cards are generally a plastic card that has an embedded microchip and possibly a micro-processor. These chips can store data or process data. The data is usually associated with information and a value and transact with the card’s processor if it has one. Systems that can greatly benefit from smart card technology are inventory management, people management, time card and attendance, access control, and health care. Really anywhere you want to monitor and or limit access to an area you can see the value in smart cards.

Smart cards have been around for decades in many types of applications. Two applications that seem to have been around forever would be ATM/credit cards and calling cards. In the phone cards the magnetic strip made the card a “smart” card. It stored information such as showing how many minutes you had on the card per a calling zone or country code. If you called outside of the country you activated the card in, you typically got fewer minutes as it costs more to call different countries.   ATM/credit cards carry considerably more information in their magnetic stripe. Going down the road to 1999, people found you could get devices to read peoples card at range. For example if I had the right device I could read your card while in your pocket. Then clone your card and start spending your money. I know because it actually happened to me.  Basically using the reader the criminals could make dummy cards of my original.

Newer smart card technology works off of layers of materials. These cards are made of pressed or laminated polyester or PVC. Inside of the basic smart card is a small chip with a copper wire coming off of it wrapped into many windings.  This card is set to a certain frequency. Your card reader picks it up as a specific number value. This value corresponds to a column in a database. This typically lets an individual gain access to a restricted area or areas. The database has to have the card added to allow access to these restricted areas.  This type of card, sometimes referred to as RFID passive smart card, has no information of value stored on it. They have a number printed on the back of them and that is the value you must enter into your database that controls the access. The range on this card is 10 centimeters. Most people end up tapping the card to the reader.

Memory smart cards have the ability to store and delete and that is it. Institutions that have implemented this force wide are the military.  These cards shine for soldier record keeping. Before a soldier had to carry paper records between duties stations as they were moved about the world. This was open to many issues from loss to tampering with. Most soldiers have two files. The first is your 201 file that tracks where you have been and what you have done in your career with the military. The other file is their medical record.  The 201 file is important to limit access to as external threats may use them to try to impersonate personnel to gain access to restricted areas, or set themselves up for early promotions. The medical file is extremely important as it has your medical history contained. Past surgery’s and health issues that doctors need to know now. Instead of waiting for the paper file to show up, now with a swipe of a card all information can be realized.  Memory cards can be fitted with different storage sizes depending on your needs. As cards of this type are straight memory cards your reader would need to be configured to read it. Readers are not smart in that they have an auto detect feature to determine card type and protocols needed to read the card.

Micro-processor cards in the family of smart cards are engineered for high security encryption protocols and counter measures. Smart cards of this type are designed to allocate memory into separate sectors for storage for files assigned to a specific function or application. Built inside of the card are the microprocessor and a battery.  The CPU operates similar to a standard PC processor in the sense it does have an operating system with capabilities that permits different and multiple functions. The ability to run different applications and types of data gives the card versatility the early cards just did not physically allow for. With the ability of these cards to have applications on them other types of security encryption can be used further prevent tampering and cloning of cards.  The technology allows secure identification of the individuals and allows updates of information with card replacement. This can lower programming costs and enable re-usability as updates and changes come out. Similar to a PC when updating the operating system. You download new information install it and configure it, you would not just run out and buy another computer. The card does have to have power in many cases. A small battery will be installed inside of the card.  Some card manufactures designed the card for the battery to be replaced others do not. Buyers beware on which card you get as this can turn out to be a hidden cost on an already expensive system.

There are many configuration options for the chips for cards in this category. Cards with smart chips can support cryptography public key infrastructure to Java, so they are very versatile.

The form factor on these cards varies. The card most people have seen is about the size of a standard credit card but considerably thicker. That style accommodates both RFID and smart cards.  Another style with several variants is the key fobs. They can be the size of a key fob for a car, some smaller than others. All can be smart but few if any allow for battery replacement.  Another newer style is a sticker the size of a nickel and about 2 mm thick. That is great for sticking to a cell phone or other device you have all the time.

Access control cards come in many shapes and size with many different features. Always make sure to read and ask questions before purchasing yours.


We have gone High “Teck” ! Introducing the Rollout of IDTECK’s Access Control

Written By:
Wednesday, May 28th, 2014

TechPro Security Products is now the main distributor of high end Access Control Systems and Accessories in the United States through IDTECK, a global powerhouse in Access Control.

IDTECK has made some significant strides in Access Control and their systems are implemented in some of the highest security driven markets such as the Pentagon and The Department of the Army here in the United States. Worldwide, IDTECK has made a name for themselves in every continent.

What sets IDTECK apart from other Access Control Companies is the fact that in 2009, IDTECK was awarded the US and Korean Patent for Facial Recognition in an Access Control System, which they are working on to implement.

IDTECK also has major ODM contracts with Motorola and Samsung.

Stand-Alone Access Control Readers

The ACRS-MAC1000-SR shown below is the ultimate in a stand-alone Access Controller. There is up to 4 steps in security with this unit. Keypad, Fingerprint, Access Card and Video. There is no other product like this in the market. This unit can also act as a videophone.


Fingerprint Recognition

IDTECK has also been the leader in Fingerprint Recognition. Gone are the days when you can make a simple copy of a fingerprint or cut someone’s finger off (like they show in the movies). IDTECK’s Fingerprint Algorithm is heat sensitive and knows when it is detecting a “living” finger. A severed finger is cold to the touch. Also, because of the special fingerprint algortim, IDTECK’s Fingerprint Readers can read fingers that are scarred, wrinkled, burned, and oily. The level of sophistication in just IDTECK’s Fingerprint Recognition and Facial Recognition alone is the reason why we at Techpro Security Products have chosen to distribute IDTECK’s Access Control products through our Retail site ( as well as our Dealer Site (


Access Control Systems

There are multitudes of configurations when it comes to Access Control. From one to many hundreds of doors, you can achieve a secure environment making sure only the people you want to have entrance will have the correct credentials. Case study after case study has shown that IDTECK’s Access Control Systems delivers that high-end security every time. From hotels and hospitals to government agencies, IDECK continues to beat down their competition through constant performance and upgrades to their products.

Below is a sample wiring diagram for an 8 Door Access Control System via a TCP/IP Network.

POE Diagram

In this configuration I am using the iEDC 8 Door Access Control Board (which also does come in a package). I am only showing the configuartion for 1 of those 8 doors in this diagram. This Access Control board is networked using Cat5e Ethernet cable and can be powered via PoE (Power over Ethernet) or 12v DC Power. The Board is connected to the hub and so is your computer. The iEDC has an Embedded Web Server so that you can connect directly into it via your computer without the need of additional software. For a more enhanced approach to your access control, we suggest purchasing the Enterprise Software, giving you control over features such as Time Management, ID Badging, Visitor Management and Video Surveillance.

The iEDC Eight Door Access Controller will also need to connect to your readers, locks and buttons at each door. On the entrance to each door there will be a reader. Readers come in various forms such as Proximity Card Access, Fingerprint Access, and Keypad Access (or a combination of each) and they can also be Smart Card Accessible or traditional RF (radio frequency) Card Accessible. Smart Cards are RF cards that can also hold data. Those Readers will unlock either a Door Strike or a Magnetic Lock and the individual will now have access. On the other side of the door for exiting purposes, there will be a “request to exit” button which will signal the Access Controller to unlock either the electronic door strike or Magnetic Lock.

All 8 of these door configurations can all be controlled by your computer so you can maintain a constant guard to your facilities. Keep in mind that this is a simple example of an 8 door system. As stated above, the possibilities are endless for configurations of one to many doors.

Vandal Resistant Controllers

As I have stated, IDTECK is always improving their line of Access Control Products. They have developed a completely weatherproof and waterproof, Vandal resistant Proximity Standalone Controller. I have been told directly from the manufacturer that they have tested the strength of the LED Touchpad of the ACRS-100RV shown below.


They tested everything with this unit from hammers and screwdrivers to even a drill. IDTECK’s representative said that he personally put all his might using a drill bit and actually broke 3 bits before he started to go through this keypad controller. I would venture a guess that the would-be criminal would already be apprehended before he could even get into the second drill bit, being that most doors with access control would also have surveillance cameras with motion alerts.

Smart Cards

Last on my list of how great IDTECK’s Access Control Products are their powerful smart cards. Smart cards have the benefit of a standard Proximity Access Card along with the ability to save information on it such as food credits or cash allowance. Students at a college could use this type of card to not only gain access to their classes that they are registered for, but they can also use it as a type of “refillable credit card” so that the student can buy books, clothes or food at the recreational center. In a hospital or office environment the same type of card could be used to gain access into certain areas and to also buy food at the office complex. These Smart cards come in credit card slim size and also Key Fobs and stickers that can easily be attached to your personal belongings such as a smart phone or wallet.

Smart card

In Conclusion

You have come to know and our manufacturer TechPro Security Products as being the leader in CCTV and IP Security Systems. With the addition of IDTECK’s Access Control Systems, we are proud to have a one-stop shop for all of your security and surveillance needs. To find out more about our new line of IDTECK’s Access Control Products visit our Access Control page at on our website.