Weatherproof SIM Card 4G WiFi Access Control System with Camera RFID NFC Time Attendance for School with GPS

Customization: Available
Type: Access Control System
Card Type: CPU, EM, DESFire EV1/EV2/EV3

Product Description

Access Control System
Product Overview

CT10 is an advanced access control terminal featuring a camera and four authentication methods, including mobile credentials (BLE/NFC), RFID cards, QR scanning, and keypad input. It supports flexible connectivity via Ethernet, 4G, WiFi, and LoRaWAN for real-time or standalone operation. With an open SDK and customizable 3.5-inch touch interface, it enables tailored integration across corporate, industrial, and smart building applications.

Centralized Control: HTTP Server Centralized Access Control System with RFID/QR Code/Mobile Credential Reader.
Smart Interface: 3.5" Touch Screen Terminal with Embedded Linux OS & SDK.
Global Connectivity: Embedded 4G, WiFi, LoRaWAN, TCP/IP using HTTP/HTTPs protocols.
Integrated Control: Embedded Relay Control for Lock & Facility Management supporting Host & Local Modes.
Technical Specifications
CT10 IDENTIFICATION
RFID 125KHz PROX™, EM; 13.56MHz Mifare® Classic, Ultralight®, Plus, DESFire® EV1/EV2/EV3, NFC tags
Mobile Credential BLE, NFC, QR Code
Keypad Supported (Touch Screen)
GENERAL & INTERFACE
Operating System LINUX OS
Display 3.5" touch screen (Resistant to UV ray)
Camera Autofocus with LED Flash
Communication TCP/IP (RJ45), WiFi, LoRaWAN, 4G, RS485, Wiegand
I/O Ports Door contact, Exit button, Buzzer control, Tamper alarm
CAPACITY & INSTALLATION
Max Users 100,000 (Local); Unlimited (Online)
Event Logs 200,000 logs; 7,000 Image logs
Power Supply DC 12~24V or PoE IEEE802.3af
Dimensions 198mm(H) * 82.6mm(W) * 46mm(D)
Protection IP65 Rated, UV Resistant, Operation Temp: -20~60ºC
Key Features
Multiple Authentication

Support Multiple Authentication Technologies
Combine mobile App, digital credentials, and physical cards for enhanced security.

Cloud Management

Cloud Management: Real-time remote control of locks and facilities via encrypted HTTP/HTTPS.

4G GPS

4G + GPS: Reliable outdoor connectivity and location verification for remote construction sites.

Secure Encryption

AES Encryption: Advanced protection for digital credentials and communication protocols.

Weatherproof

Weather-Resistant: Compact mullion design with robust IP65 housing for any environment.

Auto Record

Auto Image Record: Automatically captures snapshots upon access for a clear visual audit trail.

For Developers

A robust SDK with demo software is provided for third-party server integration. The hardware testing package includes all necessary accessories and software tools for easy configuration, fast development, and seamless firmware upgrades.

SDK for Developers
Customization Services

We offer comprehensive customization services including hardware modifications, reader housing design, firmware adjustments, and specialized software development to meet unique project requirements.

Customization Service
Related Solutions
Product line 1
Product line 2
Detail 1
Detail 2
Detail 3
Frequently Asked Questions
What authentication methods does the CT10 support?
The CT10 supports four primary methods: Mobile credentials (BLE/NFC), RFID cards (125KHz and 13.56MHz), QR Code scanning, and digital keypad input via the touch screen.
Can this device be installed outdoors?
Yes, the device is IP65 rated, meaning it is protected against dust and water. It is also built with UV-resistant materials to withstand strong sunlight.
Does the CT10 require a constant internet connection?
No, it supports both Local Mode (storing up to 100,000 users and 200,000 logs locally) and Online Mode for real-time cloud management.
What connectivity options are available for the terminal?
It offers highly versatile connectivity including TCP/IP Ethernet (with PoE support), WiFi, 4G LTE, and LoRaWAN.
Is there a way to verify who entered the premises visually?
Yes, the CT10 features an integrated camera with autofocus that automatically takes a snapshot during access events, saving it as an image log.
Is the system secure against hacking or cloning?
The system utilizes advanced AES encryption for digital credentials and employs secure HTTPs protocols for all server communications.

Related Products