Hirsch Electronics RUU-GEN - Controller

Technical Specification

Features:
  • Make: Hirsch Electronics
  • Model code: RUU-GEN - Controller
  • Controller Type: Standalone/Networkable
  • Networkable: Yes
  • Universal / Wiegand Reader Interface: Yes
Read more
Additional info:

PKI Option.  Protected PIN.  LAN Port: Ethernet TCP/IP (10/100).  Serial Ports: RS-232, RS-485.  Wiegand Port: 75 bit with parity standard (user programmable up to 128 bits).  Durable ABS housing.  Reads contact or contactless MIFARE or DESfire smart cards.  Mount type: wall or desk stand.Biometric Fingerprint Reader:  INCITS 378-2004 Interoperable Minutiae AlgorithmFingerprint Sensor: Silicon (500dpi), 320 x 480FRR: 0.01% - 0.001%FAR: 0.01% - 0.0001%Contact Smart Card Reader: ISO 7816Contactless Smart Card Reader: ISO 14443-A, BIncludes CD with configuration software.

Read more
Make Hirsch Electronics
Manufacturer Hirsch / IDENTIVE
Category Access Control>Access control controllers
Model code RUU-GEN - Controller
Controller Type Standalone/Networkable
Networkable Yes
Universal / Wiegand Reader Interface Yes
Electrical Specifications Voltage: 15 ~ 60 V DC
Power Consumption: 300 mA @ 24 V DC, PoE
Physical Specifications Dimensions mm: 215 x 240 x 118
Weight g: 900
Environmental Specifications Operating Temp oC: 0 ~ 55
Operating Humidity %: 0 ~ 90
Additional info

PKI Option.  Protected PIN.  LAN Port: Ethernet TCP/IP (10/100).  Serial Ports: RS-232, RS-485.  Wiegand Port: 75 bit with parity standard (user programmable up to 128 bits).  Durable ABS housing.  Reads contact or contactless MIFARE or DESfire smart cards.  Mount type: wall or desk stand.

Biometric Fingerprint Reader: 

  • INCITS 378-2004 Interoperable Minutiae Algorithm
  • Fingerprint Sensor: Silicon (500dpi), 320 x 480
  • FRR: 0.01% - 0.001%
  • FAR: 0.01% - 0.0001%

Contact Smart Card Reader: ISO 7816

Contactless Smart Card Reader: ISO 14443-A, B

Includes CD with configuration software.

Download PDF version Download PDF version

Related Whitepapers

Cybersecurity in keyless access management

Three essential reasons to upgrade your access control technology in 2022

Securing unmanned infrastructure at the network edge

Quick poll
What's the primary benefit of integrating access control with video surveillance?




Related tags