HID Mercury™ M5-16DOR Controller

Technical Specification

Features:
  • Make: HID
  • Model code: Mercury™ M5-16DOR
  • Series: M5 Bridge
  • Communication Type: 9600, 19200, 38400, or 115200 bps, asynchronous
  • Voltage: 12 V DC
Additional info:

The M5 Bridge was built from the existing HID Mercury controller platform and has been redesigned to fit the specific physical parameters of Casi Micro5 enclosures used in Picture Perfect™, Secure Perfect™ and Facility Commander™ access systems. Key Benefits: Delivers plug and play format for a “screwdriver-less” changeover in Casi upgrades Provides a bridge from legacy systems to new and future access control systems Provides all current and future HID Mercury feature sets and future feature upgrades to the traditional HID Mercury platform Does not require power management controller (standard in the legacy products)

Read more
Make HID
Manufacturer HID
Category Access Control>Access control controllers
Model code Mercury™ M5-16DOR
Communication Type 9600, 19200, 38400, or 115200 bps, asynchronous
Electrical Specifications Voltage: 12 V DC
Power Consumption: 40mA
Physical Specifications Dimensions mm: 260 x 89 x 18
Weight g: 144
Environmental Specifications Operating Temp oC: 0 ~ 50 C (32 ~ 122 F)
Operating Humidity %: 5 ~ 95
Additional info

The M5 Bridge was built from the existing HID Mercury controller platform and has been redesigned to fit the specific physical parameters of Casi Micro5 enclosures used in Picture Perfect™, Secure Perfect™ and Facility Commander™ access systems.

Key Benefits:

  • Delivers plug and play format for a “screwdriver-less” changeover in Casi upgrades
  • Provides a bridge from legacy systems to new and future access control systems
  • Provides all current and future HID Mercury feature sets and future feature upgrades to the traditional HID Mercury platform
  • Does not require power management controller (standard in the legacy products)
Download PDF version Download PDF version

Related Whitepapers

The 2024 state of physical access trend report

The truth behind 9 mobile access myths

6 good reasons to embrace mobile credentialing

Quick poll
Which AI-powered capability will dominate in the years ahead?