Contact

Please get in touch. We will be pleased to assist you.

Go to contact form

Newsletter

+49 89 68004 - 0
(Monday to Friday, 8:00 am to 5:00 pm)

kontakt@pcs.com

PCS Locations

Service & Repair

Device Repair Order Form

+49 89 68004 - 666
(Monday to Friday, 8:00 am to 5:00 pm)

Questions concerning DEXICON: dexicon@pcs.com

Questions concerning INTUS COM: intuscom@pcs.com

Other questions: support@pcs.com

Solution partner

PCS works with approximately 100 software and system house partners from all over Europe. They offer security solutions based on INTUS products and addressing all areas of production data collection and security technology.

Go to Partner Finder

RFID-Karten für Zutrittskontrolle, Mitarbeiterausweis, Bezahlung in der Kantine etc.

Identical - authentic - verified?

When talking about access control you inevitably come across three terms: identification, verification and authentication.

Although these terms are generally defined in very different ways, the following definition has become generally accepted in the security market:

Identification is the process of determining the identity of a person from a group of practically any size. For this purpose, the data of this person is compared with all data in the system (1:n comparison). In a face recognition system, for example, all facial features stored in a database can be compared with the currently recorded face.

During verification or validation, a specific feature on a data medium is compared with a feature of the person (1:1 comparison). The classic example is the fingerprint, which is stored on an access card and compared with the finger placed on the fingerprint terminal.

Authentication (Greek: authentikós: genuine, vouched for) is the process of establishing a person's identity beyond doubt. The system establishes that it is the person himself, and not just that person's card.

Back to overview

Your PCS Contact

Walter Elsner
CEO

Go to contact form