Software House SWH-4100EG Access control reader
Technical Specification
- Make: Software House
- Model code: SWH-4100EG
- Series: Multi-Technology Series
- Long Range: Yes
- Reader Type: Proximity
Multi-Technology Flex Reader. The flex readers save significant time and money by allowing users to simply flash new card protocols or formats directly to the reader. Flex versions are configurable to read MIFARE® sectors and can also simultaneously support Federal Information Processing Standard (FIPS 201) government-issued smart cards. The Multi-Technology Readers provide the only available solution today that supports all of the following: proximity, MIFARE (serial number or sectors), and FIPS 201 PIV-II cards in a single reader.
Read moreMake | Software House |
---|---|
Manufacturer | Software House |
Category | Access Control>Access control readers |
Model code | SWH-4100EG |
Series | Multi-Technology Series |
Long Range | Yes |
Reader Type | Proximity |
Standalone/ Networkable | Standalone |
IP Rating | IP65 |
Mount Type | Surface |
Read Range mm | 102 |
LED / Beep | LED / Beep |
Color | Gray |
Wiegand Interface | Yes |
Electrical Specifications |
Voltage: 8 ~ 16 V DC Power Consumption: 125 mA |
Physical Specifications | Dimensions mm: 111 x 84 x 28 |
Environmental Specifications |
Operating Temp oC: -35 ~ +67 Operating Humidity %: 0 ~ 100 |
Additional info |
Multi-Technology Flex Reader. The flex readers save significant time and money by allowing users to simply flash new card protocols or formats directly to the reader. Flex versions are configurable to read MIFARE® sectors and can also simultaneously support Federal Information Processing Standard (FIPS 201) government-issued smart cards. The Multi-Technology Readers provide the only available solution today that supports all of the following: proximity, MIFARE (serial number or sectors), and FIPS 201 PIV-II cards in a single reader. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The Critical Importance of Trusted Execution Environment in Access Control
Four Areas to Consider in Frictionless Access Control
Access and Security In The Age of Hybrid Working