Check out our special report on Cybersecurity
HID Signo™ Biometric Reader 25B - Multi-technology, mobile ready, fingerprint reader
Technical Specification
- Make: HID
- Model code: Signo™ Biometric Reader 25B
- Reader Type: Biometric
- Mount Type: Mullion mount
- Reader Output format: 1:1: ANSI 378 / 1:N: Proprietary (ANSI 378+ format)
Highly Versatile — Unmatched flexibility to deploy multiple authentication modes, including biometric fingerprint and contactless physical and mobile credentials with a single reader platform Enhanced Performance — Advanced biometric fingerprint match reliability Connected to the Future — Easily configure and manage in the field with HID Biometric Manager, including support for software upgrades over the network
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control readers |
| Model code | Signo™ Biometric Reader 25B |
| Reader Type | Biometric |
| Mount Type | Mullion mount |
| Reader Output format | 1:1: ANSI 378 / 1:N: Proprietary (ANSI 378+ format) |
| Read Range mm | Seos™ - 30 mm / iCLASS® - 50 mm / MIFARE® Classic , MIFAREPlus - 80 mm / MIFARE DESFire® (EV1, EV2, EV3) - 40 mm |
| Colour | Black Body; Silver Mounting Bracket |
| Wiegand Interface | Yes |
| Electrical Specifications | Voltage: 12 V DC (9 ~ 14 V DC) |
| Physical Specifications |
Dimensions mm: 50 x 204 x 55 Weight g: 380 |
| Environmental Specifications |
Operating Temp oC: -20 ~ +66 C (-4 ~ +153 F) Operating Humidity %: 0 ~ 95 |
| Protection | IP67, IK09 |
| Additional info |
|
- See other HID products
- HID Access control cards/ tags/ fobs
- HID Access control controllers
- HID Access control software
Related Whitepapers
Three essential reasons to upgrade your access control technology in 2022
Physical access control in higher education
OSDP is the strongest access control for your business
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

