Software House SWH-4100EG Access control reader
Technical Specification
- Make: Software House
- Model code: SWH-4100EG
- Series: Multi-Technology Series
- Long Range: Yes
- Reader Type: Proximity
Multi-Technology Flex Reader. The flex readers save significant time and money by allowing users to simply flash new card protocols or formats directly to the reader. Flex versions are configurable to read MIFARE® sectors and can also simultaneously support Federal Information Processing Standard (FIPS 201) government-issued smart cards. The Multi-Technology Readers provide the only available solution today that supports all of the following: proximity, MIFARE (serial number or sectors), and FIPS 201 PIV-II cards in a single reader.
Read moreMake | Software House |
---|---|
Manufacturer | Software House |
Category | Access Control>Access control readers |
Model code | SWH-4100EG |
Series | Multi-Technology Series |
Long Range | Yes |
Reader Type | Proximity |
Standalone/ Networkable | Standalone |
IP Rating | IP65 |
Mount Type | Surface mount |
Read Range mm | 102 mm |
LED / Beep | LED / Beep |
Colour | Gray |
Wiegand Interface | Yes |
Electrical Specifications |
Voltage: 8 ~ 16 V DC Power Consumption: 125 mA |
Physical Specifications | Dimensions mm: 111 x 84 x 28 |
Environmental Specifications |
Operating Temp oC: -35 ~ +67 Operating Humidity %: 0 ~ 100 |
Additional info |
Multi-Technology Flex Reader. The flex readers save significant time and money by allowing users to simply flash new card protocols or formats directly to the reader. Flex versions are configurable to read MIFARE® sectors and can also simultaneously support Federal Information Processing Standard (FIPS 201) government-issued smart cards. The Multi-Technology Readers provide the only available solution today that supports all of the following: proximity, MIFARE (serial number or sectors), and FIPS 201 PIV-II cards in a single reader. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The critical importance of Trusted Execution Environment in access control
The security challenges of data centers
Access and security in the age of hybrid working
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download