Call now:
1-866-400-9292
Int'l: 1-513-239-6322

Learn More About How The ACTAtek Works

This page contain a list of questions that we regularly recieve from our clients and prospective clients. To make this page as simple as possible, we have arranged the questions by topic and have collapsed the answers to the questions. To reveal the answers, simply click on a question. If you have any additional questions or feedback please click here.

General Questions ( Show All | Hide All )

The standard ACTAtek is available in 1000 and 3000 user models. Special order, biometric capable units are also available up to 20,000 user models. Please contact our sales department if your application requires a high user count.

Yes!  The ACTAtek can be used outdoors when properly installed.  In fact, the ACTAtek has been rated IP65.

Ingress Protection (IP) Codes:

1st Digit Protection Against Foreign Objects 2nd Digit Protection Against Moisture
0
Not Protected
0
Not Protected
1
Protected against objects larger than 50mm
1
Protected against dripping water
2
Protected against objects larger than 12mm
2
Protected against dripping water when tilted up to 15N
3
Protected against objects larger than 2.5mm
3
Protected against spraying water
4
Protected against objects larger than 1.0mm
4
Protected against splashing water
5
Dust Protected
5
Protected against water jets
6
Dust Tight
6
Protected against heavy seas
 
7
Protection against the effects of immersion
 
8
Protection against submersion
Source: Underwriter Laboratories©, http://www.ul.com/hazloc/ref/ingress.htm

 

ACTAteks come in a variety of different configurations.  It is important to note that, unlike many competing technologies, all of the ACTAtek models are compatible with each other.  Therefore, you may use a single Primary unit to administer fingerprint, smart card and keypad models on the same network.  With the ACTAtek you are free to design and deploy the most cost effective and usable solution possible.

Authentication Types
ACTAtek Models Fingerprint Smart Card Pin/Password
ACTA-xx-KP
X
ACTA-xx-SC
X
X
ACTA-xx-FP
X
X
ACTA-xx-FS
X
X
X
Note:  The model numbers may contain additional characters at the end to designate additional functionality.  For example, a 1000 user Combo (fingerprint and smart card) unit with an integrated CMOS camera would be designated an ACTA-1K-FSC.

 

Yes, there are several combinations of authentication methods that can be employed.  Below is a breakdown of these combinations:

ACTAtek Models UserID + PIN Smart Card + PIN Smart Card & Fingerprint
ACTA-xx-KP
X
   
ACTA-xx-SC
X
X
 
ACTA-xx-FP
X
   
ACTA-xx-FS
X
X
X

 

Biometric / Fingerprint Related Questions ( Show All | Hide All )

To record a user’s fingerprint information, a user simply places their finger on the scanner and waits for about 1 second for the unit to record the minutiae data.  Depending on the number of templates that the administrator has assigned the unit to capture, the user will repeat this process several times with one or more fingers

Yes!  Incorrect placement of a user’s fingerprint can lead to a false rejection of the user.  It is extremely important that the user follow a few simple steps when registering and authenticating with the ACTAtek unit.  These steps can be found in the following document:

The unit does not store images of a user’s fingerprint!  When a user is initially enrolled in the ACTAtek unit, several scans of the fingerprint are made.  Each of these scans is processed by a proprietary algorithm to identify special characteristics of the user’s fingerprint called minutiae.  This information, not an image, is stored in the ACTAtek.  Subsequently, when a user places their finger on the scanner to authenticate, the scanner reads in the fingerprint image and uses the stored information to match minutiae points on the fingerprint

Unfortunately, there are some people for who biometrics will not work consistently.  For example, a person who works in a dirty, oily or greasy environment may not have clean enough finger for consistent fingerprint matching.  For applications where this or other similar scenarios may occur, we offer an optional built-in Mifare Smart Card reader/writer that can be used by itself or, for greater security, with a PIN number.

The ACTAtek unit can be easily configured to take 3, 5 or 7 templates for each user.  When a user tries to authenticate, the unit will search and try to match based on all templates stored for the user.

See the chart below for some possible configurations:

Number of scans per finger
Total number of scans
Primary Finger
(i.e. Thumb)
Secondary Finger
(i.e. Index Finger)
3
3
5
3
2
7*
5
2
* 7 scans are recommended for greater reliability.

 

Smart Card / Proximity Card Questions( Show All | Hide All )

Yes! The ACTAtek system can be used with existing HID Prox, Prox II and iCLASS. No special formatting is required. To enroll a user with their existing HID Prox, Prox II or iCLASS card, an administrator simply registers the card with the unit and associates the card with the user in the ACTAtek system.

HID compatibility makes it simple to add biometric security in an HID Prox, Prox II and iCLASS environment.

No, the ACTAtek uses the HID Prox, Prox II and iCLASS cards's CSN number for identification. For added security, the ACTAtek can then be used to verify the user using fingerprint recognition.

Despite their equal dimensions, the Mifare Smart Card is essentially a proximity card and works entirely different from normal magnetic strip card such as a credit card.  The Mifare Smart Cards use an embedded chip and antennae to transfer encrypted information between the unit and the smart card.  The user’s information is encrypted and transfers to the card when an administrator creates the account for the user.  To transfer the information between a smart card and an ACTAtek, a user simply places the card next to the keypad of the ACTAtek and the information is automatically transferred.

In select ACTAtek models internal Mifare Smart Card Readers/Writers are embedded behind the keypads of the units.  This allows for a smart card to be place near the keypad and have all the necessary information to be transferred from the card to the ACTAtek. The user’s information is encrypted and transfers to the card when an administrator creates the account for the user.  Of course, the administrator can always create a new card for a user.

User Administration and Access Control Policies( Show All | Hide All )

Some of the ACTAtek’s administration is performed from an easy to use, menu-driven interface on the unit itself.  However, most of the ACTAtek’s functionality is accessed through a built-in web server.  The following are more detailed descriptions of each method:

The administrative menu:  An administrative panel can be accessed by using the ACTAtek’s keypad and the LCD screen.  This panel allows an administrator to add/delete/activate/disable all types of users, configure networking parameters, adjust the time and date and several other device related features.

The built-web server:  One of the best features of the ACTAtek is its web interface.  The unit connects directly to the corporate network and can be accessed via a standard web browser such as Microsoft Internet Explorer, Safari or Firefox.  From this administrative interface almost all of the ACTAtek’s features can be accessed.  The web server also allows for four different types of user to access the select areas of the interface.  Please contact the sales department to test drive one of our live units from your computer!

In keeping with our commitment to make the ACTAtek as flexible as possible, 4 different levels of administration can be assigned to users.  Below is a brief description of these levels:

Personal User:  This is the default level for each new user.  This class of user can only view their user statistics from the web interface.

User Administrator:  A User Administrator can perform all the functions related to managing users, departments and access policies.  This user cannot view or modify system settings or the ACTAtek’s network configuration.

Network Administrator:  Since the same people are generally not in charge of HR and IT, the ACTAtek allows for the IT department to access network related options but none of the users related options.

Super Administrator:  As the name suggests, this class of user has full reign of the ACTAtek and its configuration.

Each user in the ACTAtek can be assigned to one or more Access Groups.  Each of these Access Groups consists of one or more Access Rights.  These Access Rights determine when access will be granted by a specific ACTAtek unit or terminal.  Below is an example configuration:

Access Rights
Access Rights

ACTAtek Terminal

Allowed Access Periods
1
Main
Monday-Friday, 8:00AM – 6:30PM
2
Main
Monday – Friday, All Day Access
3
Main
Saturday, 10:00AM – 5:30PM
4
Main
Saturday – Sunday, 7:30AM – 11:00PM
5
IT_Closet
Monday-Friday, 8:00AM – 6:30PM
6
IT_Closet
Everyday, All Day Access

Access Rights
Access Groups Assigned Access Rights
General Employees 1, 3
Managers 2, 4
IT Staff 1, 4, 5
IT Managers 2, 4, 6

Example:  Members of the IT Managers Group could access the Main area at any time Monday through Friday, Saturday and Sunday 7:30AM to 11:00PM and also has access to the IT_Closet at any time on any day.  Manager can access the Main areas at the same times as the IT Managers but cannot access the IT_Closet at any time.

 

Networking( Show All | Hide All )

The ACTAtek is a true TCP/IP network appliance.  It allows for both manual configuration of network settings and the use of DHCP.  Initial configuration is performed on ACTAteks administraton panel.  Once connected to the network, other network parameters, such as Network Time Protocol (NTP), can be configured via the ACTAtek’s web interface.  The chart below details the network functionality based on interface:

Physical Interface Web Interface
DHCP Assignment
X
X
IP Address Assignment
X
X
Subnet Mask
X
X
Gateway Address
X
X
DNS Address
X
X
Primary IP Address*  
X
Network Access Range**  
X
SMTP Server IP/FQDN  
X
Admin Email Address  
X
Network Camera IP  
X

* The “Primary IP Address” refers to IP address of the primary ACTAtek unit – not the unit’s IP address.

** Network Access to the unit can be limited to either a specific IP or subnet.

The ACTAtek system is designed to function as standalone unit or part of a network or ACTAteks.  When more than one unit is networked together, the units are part of a Primary / Secondary model.  This means that 1 unit acts as a master and subsequent units are connected, through the “Primary IP” option, as secondary devices.

The Primary unit coordinates the exchange of information between all the connected units.  Here is a list of the information that is shared:

User Information: When a user is registered on one of the units the information is automatically propagated to all the other units. This is also true when a user is modified, deleted etc.

Event Logs: The Primary unit stores a copy of all the events that have occurred on all of the units. All of the access information can be viewed, sorted and exported from the Primary unit’s web interface.

Access Control: Since it is likely that individual users will have different access rights to different access points, the ACTAtek was designed to allow for differing policies for different users. All of the policies are managed from the Primary unit! There is no need to connect to individual units to manage their policies.

Yes, with a few caveats:

  • For secured communication, which is highly recommended, traffic on TCP port 443 must be forwarded to the ACTAtek. This is generally possible if there isn’t a web server handling SSL communications. Please consult you network administrator if this functionality is desired!
  • The ACTAtek can be configured to accept unsecured communication on any port from 1 to 9999. The default is the standard for web requests, port 80. NOTE: using any port other than 443 leaves the traffic unsecured! All usernames and passwords, including the Super Administrator’s, would be sent in clear text allowing hacker to easily gain access to your system! It is recommended that the network administrator simply not allow access other than secured access from port 443 (SSL).
  • Due to the nature of SSL certificates, users connecting to the ACTAtek using port 443, or the “https://” prefix, will be presented with a SSL certificate warning. This warning is presented because there is no way for a Certificate Authority to verify certificates on devices such as the ACTAtek. However, the traffic is still being encrypted using a heavy duty, 128bit encryption algorithm.