Idesco Access DESFire 13.56 MHz reader
Technical Specification
- Make: Idesco
- Model code: Access DESFire
- Reader Type: Proximity
- Standalone/ Networkable: Networkable
- IP Rating: IP67
Access DESFire reader is freely configurable enabling the customer to build their own applications flexibly and reads compatible application specific data from one selected application file of the Mifare® DESFire transponders. A DESFire configuration card defined by Idesco or by the customer is used for programming the required reader output, application specific triple DES keys, application AID and file number to be read. Also the required data length can be defined according to individual application demands.
Read more| Make | Idesco |
|---|---|
| Manufacturer | Idesco Oy |
| Category | Access Control>Access control readers |
| Model code | Access DESFire |
| Reader Type | Proximity |
| Standalone/ Networkable | Networkable |
| IP Rating | IP67 |
| Keypad Integrated | Yes |
| LED / Beep | LED / Beep |
| Wiegand Interface | Yes |
| Electrical Specifications |
Voltage: 24 V DC Power Consumption: 20 mA |
| Physical Specifications | Dimensions mm: 85 x 85 x 24 |
| Environmental Specifications | Operating Temp oC: -40 ~ +55 |
| Additional info |
Access DESFire reader is freely configurable enabling the customer to build their own applications flexibly and reads compatible application specific data from one selected application file of the Mifare® DESFire transponders. A DESFire configuration card defined by Idesco or by the customer is used for programming the required reader output, application specific triple DES keys, application AID and file number to be read. Also the required data length can be defined according to individual application demands. |
- See other Idesco products
- Idesco Access control software
Related Whitepapers
Access and security in the age of hybrid working
Integrated access control: reap the benefits of connected security
Three essential reasons to upgrade your access control technology in 2022
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
