Check out our special report on Cybersecurity
HID WP644 Access control reader
Technical Specification
- Make: HID
- Model code: WP644
- Series: Dorado Series
- Reader Type: Card Swipe
- Standalone/ Networkable: Standalone
The reader accepts cards encoded on track 1 or 2, and are encoded with either ABA/ANSI/ISO or EMPI encoding. EMPI is HID's own encoding format that provides a higher level of security than standard ABA/ANSI/ISO encoding. ABA/ANSI/ISO encoding format refers to the industry standard 75 BPI, 5 bits per character encoding (ISO 7810 Track 2).
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control readers |
| Model code | WP644 |
| Reader Type | Card Swipe |
| Standalone/ Networkable | Standalone |
| Mount Type | Surface mount |
| LED / Beep | LED / Beep |
| Colour | Black / white |
| Wiegand Interface | Yes |
| Clock-and-Data Interface | Yes |
| Electrical Specifications |
Voltage: 4.75 ~ 5.25 V DC Power Consumption: 35mA |
| Physical Specifications | Dimensions mm: 152 x 38 x 43 |
| Environmental Specifications |
Operating Temp oC: -35 ~ +66 Operating Humidity %: 5 ~ 95 |
| Protection | Weather resistant |
| Additional info |
The reader accepts cards encoded on track 1 or 2, and are encoded with either ABA/ANSI/ISO or EMPI encoding. EMPI is HID's own encoding format that provides a higher level of security than standard ABA/ANSI/ISO encoding. ABA/ANSI/ISO encoding format refers to the industry standard 75 BPI, 5 bits per character encoding (ISO 7810 Track 2). |
- See other HID products
- HID Access control cards/ tags/ fobs
- HID Access control controllers
- HID Access control software
Related Whitepapers
Three essential reasons to upgrade your access control technology in 2022
Physical access control in higher education
OSDP is the strongest access control for your business
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

