LEGIC SC-2560/C Access control system
Technical Specification
- Make: LEGIC
- Model code: SC-2560/C
- Series: Advant Series
- Standalone/ Networked/ PC: Networked
- Operating Temperature oC: -40 ~ +85
Reader chip set developed to support the design and realisation of access control and other person related service applications providing security and scalability. Suitable for smart card projects, biometrics etc. Supports simple and fast integration into applications as well as upgrades from existing technologies such as batcode, magnetic stripe or 125 kHz proximity systems through its integrated application protocols. Host interfaces and protocols: SPI, RS232, RS485, Wiegand, Omron, BPA/9 (Subset). Encryption: LEGIC encryption standard, DES, 3DES.
Read moreMake | LEGIC |
---|---|
Manufacturer | LEGIC Identsystems Ltd |
Category | Access Control>Access control systems & kits |
Model code | SC-2560/C |
Series | Advant Series |
Standalone/ Networked/ PC | Networked |
Environmental Specifications | Operating Temperature oC: -40 ~ +85 |
Electrical Specifications | Voltage: 3.3 ~ 5 VDC |
Additional info | Reader chip set developed to support the design and realisation of access control and other person related service applications providing security and scalability. Suitable for smart card projects, biometrics etc. Supports simple and fast integration into applications as well as upgrades from existing technologies such as batcode, magnetic stripe or 125 kHz proximity systems through its integrated application protocols. Host interfaces and protocols: SPI, RS232, RS485, Wiegand, Omron, BPA/9 (Subset). Encryption: LEGIC encryption standard, DES, 3DES. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The critical role of access control in K-12 school security
The benefits of Edge AI + Cloud for security systems
Integrated access control: reap the benefits of connected security
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download