FAQ

FAQ

FAQ

F.A.Q You can find more detailed information about our products and services here.

At the website find our products and services to help you.

Barkodes is a company that develops solutions and produces solutions not only in its own sector but also for many different sectors through R&D studies and opens up to the world.

It focuses on improving its service quality day by day adopting long-term business partnerships.

It is the only domestic company in its sector that manufactures both software and hardware solutions while maintaining in-house support services for project applications.
 

We offer different solutions under the Barkodes brand in domestic and international projects. Some of our solutions as Hardware and Software;

  • Personnel Attendance Control Systems,
  • Access Control Systems,
  • Ticketing and Contactless Payment Systems,
  • Theme Park Control and Payment Systems,
  • Cinema Payment Systems,
  • Stadium Control and Payment Systems,,
  • Warehouse Management Systems
  • RFID and Barcode Product Development,
  • Personal Data Protection Law Personal Compliant Fingerprint Solutions,
  • National Identity Card Projects, 
  • Visitor and Security Control Audit Software,
  • Vehicle Tracking Systems,
  • Tailor Made Software Development Services
  • 3rd Party Software Integration Solutions,

As Barkodes, our R&D and Project department works to produce permanent solutions to innovative technologies by participating in both fairs and seminars for existing products and projects that are still at the idea stage.

By ensuring the necessary coordination between departments with the management software we have developed within the company, we manage production, establishment, testing, finance, stock tracking, etc. It is actively used in many departments.

In order to meet the needs in line with domestic and international customer demands, by using our existing system, retrospective tracking is done, product release, control and continuity of the products are ensured and transactions are carried out through the system without being dependent on the person. This system is constantly renewed with new demands within the institution.

We offer hardware and software solutions that will meet the expectations of institutions and organizations without companies having to adapt to ready-made solutions. As the Barkodes family, we invest in new technologies by allocating time and budget for research and development and produce solutions to ensure continuity.

With our company's Domestic Goods Certificate, 20 Brand and Design registered products, export and sales network to 16 countries, solution partnerships, distributorships, representatives and dealers, we aim to always keep our place at the highest level in the sector we operate in and continue to grow since the day we were founded.

1. Installation and Training
Installation, assembly, and commissioning following product delivery to the customer.
Providing training to customer personnel on the effective use of the product or system.


2. Warranty and Technical Service
Free repair, maintenance, and spare parts support during the product warranty period.
Paid maintenance and repair services after the warranty period expires.


3. Maintenance and Periodic Checks
Regular inspection and performance testing of the product at specific intervals.
Preventive maintenance to address potential issues before malfunctions occur.


4. Spare Parts and Accessory Supply
Procurement of necessary spare parts, consumables, and accessories for the product.


5. Support Line and Online Help
24/7 customer support via call center, email, or live chat.
Access to Frequently Asked Questions (FAQ) and online user manuals.


6. Software and Updates (For Technological Products)
Software updates, version upgrades, and security patches.
Fault detection and troubleshooting support via remote connection.


7. Customer Relations and Feedback
Receiving customer complaints and suggestions to provide rapid solutions.
Conducting customer satisfaction surveys and integrating feedback into business processes.


8. Consultancy and Usage Support
Recommendations for maximizing product efficiency.
Advisory services on development, integration, and system upgrades.


Our Philosophy For Barkodes, after-sales support goes beyond providing technical service only in case of malfunctions; it is a commitment to supporting the customer throughout the product's entire lifecycle.
 

Access control systems are of critical importance for both security and operational efficiency. They are especially preferred in workplaces, public institutions, factories, schools, gated communities, and sensitive zones. We can explain their importance under the following headings:


1. Ensures Security
Prevents unauthorized individuals from entering specific areas.
Keeps personnel, visitor, and vehicle entries under control.
Reduces threats such as theft, sabotage, or data leaks by allowing only authorized persons into restricted areas.


2. Tracking and Reporting
Records information on who passed through which door and when.
Enables Personnel Attendance Control (PDKS) and overtime tracking.
Generates reports on who is inside the facility during emergencies (fire, earthquake, etc.).


3. Time and Cost Savings
Reduces security personnel costs by minimizing the need for manual control.
Prevents time loss in business processes thanks to rapid access capabilities.


4. Flexibility and Integration
Supports various verification methods such as Card, Fingerprint, Facial Recognition, QR Code, or Mobile App.
Can work integrated with Turnstiles, Doors, Barriers, Fire, and Alarm systems.


5. Order and Discipline
Disciplines employee entry and exit times.
Ensures visitor entries are conducted in a controlled manner, making identity verification mandatory.


6. Legal and Corporate Compliance
Mandatory in certain sectors under Occupational Health and Safety regulations.
Ensures compliance with legal regulations such as ISO standards and KVKK (Personal Data Protection Law).


7. Prestige and Professionalism
Modern access control systems strengthen the corporate image.
Offers guests an organized, secure, and technologically advanced environment.


Conclusion For Barkodes, access control systems are vital not just for opening and closing doors, but for increasing security, ensuring efficiency, and maintaining corporate order.
 

Integration is a crucial aspect, as standalone products and services are often insufficient on their own. The integration capabilities of Barkodes products can be summarized as follows:


1. Personnel Attendance Control Systems (PDKS / T&A)
Entry-exit data retrieved from card, fingerprint, or facial recognition devices can be seamlessly transferred to T&A software.
This enables the generation of reports for attendance tracking, overtime calculations, and shift scheduling.
 

2. ERP, HR, and Payroll Software
By integrating with Human Resources and ERP systems, employee timekeeping (puantaj) data can be automatically reflected in the payroll system, ensuring accuracy and efficiency.
 

3. Physical Security Systems
Operates fully integrated with turnstiles, doors, barriers, and parking systems.
Can be paired with camera systems (CCTV) to capture images at the moment of access.
Connects with fire alarms, emergency exit scenarios, and building automation systems for coordinated safety responses.
 

4. Visitor Management Systems
Visitor entry-exit information is recorded, and seamless integration is provided with guest cards and access logs.
 

5. Cloud and Web-Based Systems
By integrating with web-based platforms, devices located in different branches or locations can be managed from a single center.


Provides cloud-based reporting and remote access capabilities.
Summary Barkodes products are not limited to their own proprietary software; they create a more comprehensive and powerful solution by integrating with your existing ERP, HR, security, or automation systems.
 

Since factories and warehouses are environments requiring high security and operational order, a combination of various security solutions is employed.


1. Turnstile Systems
Controls personnel and visitor entries/exits.
Offers access options via card, fingerprint, facial recognition, or QR code.


2. Biometric Readers
Ensures high security through fingerprint, facial recognition, or iris scanning.
Grants access to critical areas strictly to authorized personnel.


3. RFID Tracking Systems
Tracks the movement of materials, pallets, and vehicles within the warehouse.
Prevents product loss and confusion, facilitating inventory management.


4. Vehicle Access Control Systems
Controls vehicle entries/exits using Barriers, License Plate Recognition (ANPR/LPR), and RFID tags.
Permits only authorized vehicles to enter the factory premises.


5. Access Control
Works integrated with emergency exit doors, alarms, Emergency Muster (Roll Call), and PDKS systems.
Maintains visitor entry logs and provides secure access via temporary cards or QR codes.
PDKS (Personnel Attendance Control Systems): Records employee entry/exit times. Facilitates shift, overtime, and timekeeping tracking.
Online Access Monitoring (SNAP): Real-time monitoring of access events.


6. Visitor and Management Control Systems 

7. Cafeteria Control Systems 

8. Emergency Systems
9. Integrated Security Solutions
Enables the monitoring and management of all systems (Access, Turnstile, RFID, Camera/CCTV, Fire Alarm) from a single center.


Summary In factories and warehouses, security systems are not limited to entry/exit control; integrated solutions are utilized to collectively manage the security of employees, visitors, materials, and vehicles.

A Biometric Reader is a device that authenticates identity by utilizing an individual's physical or behavioral characteristics.


Most Common Biometric Technologies:
Fingerprint Recognition
Facial Recognition
Palm Vein Reading
Iris / Retina Scanning


What is a Biometric Reader? 

A biometric reader is a device that scans an individual's unique biological data (e.g., fingerprints or facial features) and compares it against pre-recorded data for verification, thereby determining whether access authorization is granted.


Why Choose Biometric Readers?


1. High Security
Cards or passwords can be shared with others; however, a fingerprint or face is unique to the individual.
It is extremely difficult to copy, steal, or forge biometric data.


2. Convenience and Speed
Eliminates the need to carry cards or remember complex passwords.
Users can gain access simply by scanning their finger or showing their face to the device.


3. Cost Advantage
Eliminates operational costs associated with lost cards, card replacements, or password resets.


4. Accuracy and Tracking
Clearly records exactly who entered or exited and at what time.
Provides reliable and undisputable results in Personnel Attendance Control (PDKS/T&A) systems.
KVKK Compliance: Fingerprint readers offer high security and are KVKK (Data Protection Law) compliant, particularly features that allow fingerprint verification directly via smart cards (Template-on-Card).


5. Flexible Integration
Can operate fully integrated with turnstiles, doors, barriers, T&A software, and CCTV systems.
Summary Biometric readers are preferred in factories, warehouses, offices, public institutions, and communal living areas due to their high security, speed, ease of use, and integration capabilities. Fingerprint readers are the most popular choice largely due to their KVKK compliance capabilities.
 

Card door lock systems in hotels are among the most preferred solutions for both security and guest comfort.


1. Installation and Technology
Electronic card locks are installed on every room door.
These locks operate using RFID (Contactless Card) Mifare technology.
In new hotel projects, doors are manufactured directly compatible with card locks, whereas in existing hotels, doors can be retrofitted to become compatible.


2. Software Integration
The system integrates seamlessly with the Hotel Management Software (PMS) used at the reception.
During check-in, the receptionist programs the card to be valid only for the specific room and within the designated date/time range.


3. Usage of Guest Cards
The guest card is used to unlock the room door.
It can also be authorized for elevator access (specific floors), spa, fitness centers, or parking entrances.
The card automatically becomes invalid upon check-out.


4. Staff and Management Cards
Special authorization cards are defined for housekeeping, technical service, or security personnel.
These cards function only in designated areas (e.g., all guest rooms, technical rooms, warehouses, etc.).


5. Energy Saving Systems
Rooms are equipped with Card Energy Switches (Energy Savers).
Electricity is activated when the guest inserts the card into the slot and is cut off when the card is removed.
This system significantly contributes to energy savings.


6. Additional Features and Integration
Online Systems: Card locks communicate instantly with the reception software (guest information or authorization updates are processed in real-time).
Offline Systems: Data is transferred and carried via the card itself.
Advantages for Hotels
High Security: Lost cards can be easily cancelled and replaced.
Comfort: Eliminates the hassle of carrying physical keys for guests.
Cost Efficiency: Reduces operational costs through energy savings.
Image: Creates a professional and modern hotel image.
Summary Card door lock systems provide hotels with security, comfort, energy savings, and ease of management.

While turnstiles provide basic physical control for entry and exit, comprehensive integration is essential for effective authorization. Incorporating cards, fingerprints, or barcodes significantly enhances security.
Additionally, integrating a camera to capture photos strengthens identity verification by creating a visual record of the access event. This facilitates the detection of misuse, card sharing (lending), or tailgating attempts. It also offers flexibility for scenarios such as visitor/supplier management or single-use access codes.


Recommended Integrated Components
Card Access
Biometric Readers (Fingerprint, Facial Recognition)
QR Code & Barcode Readers
Camera System (CCTV) + Instant Snapshot Triggering
Central Access Control Software / Logging and Reporting
Alarm/Warning Mechanisms (Access Denied, Unauthorized Attempt, Photo Log, etc.)
Sample Operation Workflow
Input: Card/QR is scanned or biometrics are verified.
Process: The system performs authentication.
Action: If authorized, the turnstile opens, and the camera captures a photo simultaneously.
Logging: All data (Card ID, Biometric ID, Photo, Timestamp) is stored.
Alert: An alarm is triggered in case of a mismatch or unauthorized attempt.

While both Proximity (ID) and MIFARE card systems are contactless (RFID-based) access control technologies, there are significant differences between them in terms of operating principles, security levels, and intended uses.


1. PROXIMITY (ID) CARD
Since Proximity cards only carry a fixed ID number, they are suitable for simple access control applications.
Operating Frequency: 125 kHz (LF – Low Frequency).
Data Storage: Contains only a unique identification (ID) number; data cannot be written to it (Read-Only).
Security Level: Low — The ID number can be easily copied or cloned.
Usage Areas: Simple access control systems.
Read Range: 0–10 cm (Varies depending on antenna power).
Memory Structure: No programmable memory; only a fixed ID number exists.
Cloning Risk: High.
Typical Cards: EM4100, TK4100.


2. MIFARE CARD
MIFARE cards offer more secure and flexible solutions as they can store data, support encryption, and serve multiple purposes (multi-application).
Operating Frequency: 13.56 MHz (HF – High Frequency).
Data Storage: Has internal memory (1K, 4K, etc.); data can be both read from and written to the card.
Security Level: High — Supports data encryption, authentication, and authorization.
Usage Areas: Access control systems, payment systems, student ID cards, hotel cards, public transportation, and museums.
Read Range: 0–8 cm (Varies depending on antenna power).
Memory Structure: Memory is organized into sectors and blocks.
Cloning Risk: Low (Secure encryption).
Typical Cards: MIFARE Classic 1K, MIFARE DESFire, MIFARE Plus.

Turnstile systems are electromechanical security solutions used to provide entry and exit control. These systems allow only authorized individuals to access specific areas, keeping personnel, visitor, or vehicle passage under control.


Key Features of Turnstile Systems:
Authentication: Can operate with various authentication methods such as Card, Fingerprint, Facial Recognition, or QR Code.
Data Logging: Can record data such as passage count, time stamps, and personnel information.
Authorization: Offers flexible authorization capabilities; for instance, allowing access only during specific hours or restricting entry to authorized personnel only.
Emergency Mode: Can be switched to free-passage mode automatically in emergencies (fire, earthquake, etc.) to facilitate evacuation.


Application Areas of Turnstile Systems:
Office and Plaza Entrances: For personnel and visitor control.
Factories and Production Facilities: For employee tracking and security auditing.
Schools and Universities: For controlling student and staff entries.
Hospitals: To prevent access to restricted or unauthorized areas.
Stadiums, Gyms, Malls, and Public Areas: To regulate visitor density and perform ticket control.
Gated Communities and Residence Entrances: To ensure security and access control.
Public Institutions: For auditing and controlling personnel and citizen entries.
 

SECURITY ADVANTAGES OF ELECTRONIC LOCKS


1. Authorization Control Each card, password, or mobile key is assigned to specific individuals. Unauthorized persons cannot gain access.


2. Audit Trails & Logging (Record Keeping) Data regarding who entered, at what time, and through which door is automatically recorded. This allows for the tracking and auditing of historical access logs.


3. No Risk of Key Duplication While traditional mechanical keys can be easily duplicated, electronic card or password systems cannot be copied or forged, eliminating security risks.


4. Temporary Access Permission Especially in hotels, cards are activated only for the duration of the guest's stay. Once the period expires, the card automatically becomes invalid.


5. Remote Management and Integration Doors can be locked or unlocked remotely, and lost cards can be instantly cancelled from the reception desk or central security station.


Hotel and Workplace Applications
In Hotels: Card door locks are preferred for guest comfort and security. Upon guest check-out, the card automatically becomes inactive.
In Workplaces: Electronic locks are integrated with the personnel card system to perform identity verification and entry tracking seamlessly.

RFID (Radio Frequency Identification) technology is a system that enables the contactless identification and tracking of objects or individuals. It is used in many areas of our daily lives without us even realizing it.


1. Access Control Systems
Personnel cards, turnstiles, and hotel room locks operate using RFID technology.
Access is gained simply by bringing the card or tag close to the reader (proximity).


2. Public Transportation Cards
Smart transportation cards are RFID-based systems.
When scanned, the balance is deducted, and access is granted.


3. Inventory and Stock Tracking
In warehouse, logistics, and retail sectors, products are tracked using RFID tags.
Counting, entry/exit processes, and location tracking of products can be performed automatically.


4. Vehicle Access Systems (Electronic Toll Collection)
At highway and parking lot entrances, the system automatically recognizes the vehicle thanks to RFID tags placed on the windshield.


5. Healthcare Sector
RFID is used in hospitals for patient wristbands and medication tracking.
It helps prevent incorrect medication administration or patient mix-ups.


6. Animal Tracking
Identification and health information can be monitored via RFID chips implanted in pets or livestock.


7. Retail and Security
Anti-theft systems in stores typically work with RFID tags.
If a product is taken out without passing through the checkout, the alarm is triggered.


8. Smart Cards and IDs
New generation ID cards, student cards, and access cards are RFID-based.
They provide identity verification and secure access.

A magnetic lock (electromagnetic lock) is an electronic security system that secures doors using magnetic force. In this system, the door is held shut by a powerful electromagnet powered by electricity and is released when the power is cut.


Working Principle of Magnetic Locks:
The electromagnet installed on the door frame and the metal plate (armature plate) attached to the door leaf come together.
When an electric current is applied, the magnet attracts the metal plate, locking the door securely.
When the power is cut or an authorized person triggers the system via card, fingerprint, password, or button, the magnet deactivates, and the door opens.


Advantages of Magnetic Locks:
Silent and Durable: Operates silently. Since there are no moving mechanical parts, friction and wear are minimal, ensuring a long service life.
Remote Control: Can be integrated with card readers, keypads, fingerprint scanners, or central management systems.
High Holding Force: Capable of providing a holding force ranging between 180 kg – 600 kg.
Safety (Fail-Safe): Can be integrated with fire or emergency systems. In case of a power outage or emergency, the door unlocks automatically (Fail-Safe principle), allowing for safe evacuation.


Usage Areas: 

It is widely used for Glass, Wooden, Metal, Aluminum, and Fire Exit doors.

The warranty period for Barkodes products is 2 years (24 months). This period commences from the date of delivery or invoice and covers manufacturing defects.


Warranty Coverage:
Malfunctions resulting from manufacturing defects.
Technical issues occurring under normal conditions of use.
 

Warranty Exclusions (Situations Not Covered):
Interventions or repairs performed by unauthorized persons.
Damages resulting from user error (incorrect connection, liquid contact, dropping, etc.).
Malfunctions caused by high voltage surges, lightning, fire, or natural disasters.

RFID (Active / Passive) systems are implemented across a wide range of fields, including warehouse tracking, logistics, stock control, and access control.


What is an RFID System? 

RFID (Radio Frequency Identification) systems are technologies that enable the automated identification and tracking of objects, individuals, or vehicles via radio waves. In this system, three main components work in unison: the tag, the reader, and the software. The identification information stored in the tag is detected by the reader and transmitted to the central system.


Advantages of RFID Systems
Contactless and Fast Reading: Unlike barcodes, line-of-sight alignment is not required for the card, product, or tag.
Multi-Reading Capability: Capable of reading multiple tags simultaneously.
Ease of Tracking: Enables real-time monitoring of product, vehicle, or personnel movement.
Durability: Operates seamlessly in dusty, humid, or dirty environments.


Key Sectors Using RFID Systems


1. Security and Access Control Systems
Card access, turnstiles, hotel door locks, and personnel tracking.


2. Logistics and Warehouse Management
Automated tracking of product entry/exit, shipments, and inventory.


3. Retail Sector
Product tags are monitored via RFID; accelerates stock counting and prevents theft.


4. Manufacturing and Industry
Tracking of parts and products on the production line; minimizes faulty production.


5. Healthcare Sector
Patient wristbands, medication tracking, and medical device management.


6. Transportation and Vehicle Tracking
Electronic Toll Collection (HGS/OGS) systems, fleet management, and parking entries.


7. Educational Institutions
Attendance and cafeteria control via student ID cards.


8. Libraries
Book lending, returns, and inventory control are managed via RFID.


Conclusion RFID systems are modern solutions that provide efficiency, speed, and security. Today, many sectors utilize RFID technology as a standard for authentication and tracking operations.

In access control systems, the system's response to a power outage varies depending on the type of device used and the installation configuration.


1. Door Status During Power Outages
Fail Safe (Unlocked when De-energized): The door unlocks automatically when power is cut. This system is generally preferred for fire exits and emergency evacuation doors to ensure safety.
Fail Secure (Locked when De-energized): The door remains locked when power is cut. This method is used in high-security areas such as offices, warehouses, and data centers where security is the priority.


2. Use of Backup Power Supply (UPS or Battery)

 In professional access control systems, a UPS (Uninterruptible Power Supply) is used to ensure the system continues to operate for a certain period during a power outage. Turnstiles, card readers, magnetic locks, and control panels remain active and functional during this time.


3. Manual or Emergency Access Options
For Turnstiles: When power is lost, the turnstile arm allows free passage, or the automatic drop-arm mechanism activates to clear the path.


For Door Systems: Access can be granted via an emergency break glass button or a manual release mechanism.
Recommendations for System Integrity To maintain security and accessibility during power outages, we recommend:
Using UPS support,
Selecting the correct lock type (Fail Safe / Fail Secure),
Installing emergency exit buttons.

In corporate security systems, regular maintenance is of critical importance to ensure continuous, safe, and effective operation.


1. Preserving System Performance
Devices such as cameras, turnstiles, card readers, or alarms can accumulate dust over time, mechanical parts can suffer from wear and tear, or software updates may be required.
Regular maintenance ensures the optimal performance of devices is preserved and prevents operational disruptions.


2. Preventing Malfunctions and Downtime
Thanks to maintenance, minor faults can be detected before they escalate into major security vulnerabilities.
For example, wear on a turnstile motor or magnetic lock could cause serious issues during a power outage or emergency if not addressed.


3. Closing Security Gaps
Through software updates and firmware checks, systems are kept up-to-date against both cyber and physical threats.
Risks of unauthorized access in Card, Fingerprint, or RFID-based systems are minimized.


4. Legal and Insurance Compliance
In some institutions, periodic maintenance of security systems is a legal obligation or a condition for insurance coverage.
Maintenance logs serve as valid evidence during potential audits or in the event of damages.


5. Extending System Lifespan
Regular maintenance extends the lifecycle of devices and systems, preventing unnecessary replacement costs.
Timely replacement of faulty or worn parts reduces the need for major repairs or complete system overhauls.
Conclusion In corporate security systems, maintenance is essential not only to prevent malfunctions but also to guarantee system security, performance, and longevity.

Barkodes solutions operate as closed-loop systems hosted directly on customer servers (on-premise). Our access control systems store personal data in an encrypted format, providing solutions fully compliant with KVKK (Personal Data Protection Law) and GDPR.
 

Card access systems implement both hardware and software-based security measures to safeguard personal data. The KVKK-compliant BioPass Smart product is specifically designed for this purpose.


1. Encryption
Data retrieved from card or fingerprint devices is transmitted as encrypted data.
Even if unauthorized persons intercept the signal, the data cannot be read or cloned.


2. Authorization and Access Control
Specific access rights are defined for each card or user.
Only authorized individuals can access designated areas.
All unauthorized access attempts are logged in the system.


3. Centralized Data Management
Access control systems operate on the enterprise's own server.
Records are stored in secure databases, strictly preventing unauthorized access.


4. Data Retention Policies
Our systems operate on a closed-loop online basis, hosted entirely within the customer's own network environment, ensuring data sovereignty.

Yes, Barkodes directly provides sales, installation, and technical service support for all the products it offers.
 

1. Product Sales & Project Planning 

We provide sales and project planning for a wide range of products and services tailored to your needs, including turnstile systems, card access systems, magnetic locks, RFID solutions, and biometric readers. Our products are manufactured to high quality and security standards, with both domestic and international shipping options available.
 

2. Installation Service

Our experienced technical team carries out the assembly and commissioning of products after the sale. During installation, we ensure that the systems operate at optimum performance and provide seamless integration suitable for your facility.


3. Technical Service and Maintenance 

We provide periodic maintenance, software updates, and technical support services post-installation. In cases requiring repair or maintenance, we ensure the continuous operation of our systems by offering fast intervention and solution-oriented support.


4. Customer-Centric Solutions 

As Barkodes, we analyze the specific requirements and security needs of every customer and optimize the systems accordingly. We offer the most efficient and secure solutions through project-specific consultancy.