Doorking 1815-350 DK Prox Long Range (AVI) Reader
Technical Specification
- Make: Doorking
- Model code: 1815-350
- Long Range: Yes
- Reader Type: Proximity
- Reader Output format: 26-bit wiegand
Because physical contact is not required, proximity card readers can read card data through common building materials like: concrete, brick, stone, drywall, plaster, glass, wood, plastic...in fact, through anything but metal. Proximity card readers are maintenance free. There are no parts to wear out or adjust. Passive card technology provides an unlimited number of "card reads" with no battery to wear out. Passive cards, unless they are physically abused, will last virtually forever. Clamshell, ISO Graphic and KeyTag type cards are available. Read ranges are not absolute and will vary depending on several factors including where the reader is mounted, the mounting surface and product application. These card readers output their data in 26-bit wiegand format. Most card readers operate on 5-12 VDC. AVI systems may operate at different voltages. These card readers are not designed for stand-alone operation (see 1520/1524 readers) and must be connected to an access controller (DKS 1830 Series systems).
Read moreMake | Doorking |
---|---|
Manufacturer | DoorKing, Inc. |
Category | Access Control>Access control readers |
Model code | 1815-350 |
Long Range | Yes |
Reader Type | Proximity |
Reader Output format | 26-bit wiegand |
LED / Beep | 2 color LED (Red, Green), Piezo Beeper |
Wiegand Interface | Yes |
Electrical Specifications | Voltage: 12 V DC |
Additional info |
|
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
A more secure alternative to 125 kHz proximity cards
Access and security in the age of hybrid working
Integrated access control: reap the benefits of connected security
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download