Check out our special report on Cybersecurity
HID Dorado 740 ruggedized magnetic stripe card reader
Technical Specification
- Make: HID
- Model code: Dorado 740
- Long Range: Yes
- Reader Type: Magnetic Stripe
- Standalone/ Networkable: Standalone / Networkable
The reader mounts indoors or outdoors on a double-gang handy box, for exposure to the elements. Its cast metal case resists vandalism and abuse, yet one simple motion through the card slot reads a card. An LED flashes to confirm that a card has been read. Three LEDs are provided to clearly indicate status.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control readers |
| Model code | Dorado 740 |
| Long Range | Yes |
| Reader Type | Magnetic Stripe |
| Standalone/ Networkable | Standalone / Networkable |
| Mount Type | Wall mount |
| Read Range mm | 203 ~ 1270 mm |
| LED / Beep | LED |
| Colour | Black |
| Wiegand Interface | Yes |
| Clock-and-Data Interface | Yes |
| Electrical Specifications |
Voltage: 10.5 ~ 13 V DC Power Consumption: 35 mA |
| Environmental Specifications |
Operating Temp oC: -35 ~ + 66 Operating Humidity %: 5 ~ 95 |
| Additional info | The reader mounts indoors or outdoors on a double-gang handy box, for exposure to the elements. Its cast metal case resists vandalism and abuse, yet one simple motion through the card slot reads a card. An LED flashes to confirm that a card has been read. Three LEDs are provided to clearly indicate status. |
- See other HID products
- HID Access control cards/ tags/ fobs
- HID Access control controllers
- HID Access control software
Related Whitepapers
Three essential reasons to upgrade your access control technology in 2022
Physical access control in higher education
OSDP is the strongest access control for your business
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

