Idesco Access 7 C
Technical Specification
- Make: Idesco
- Model code: Access 7 C
- Series: Access 7 Series
- Reader Type: Smart Card
- Standalone/ Networkable: Standalone
These multi-technology readers read the unique IDnumbers of Philips Mifare®, I-Code®, Inside PicoTag®and PicoPass®, HID iClass®, LEGIC Advant® and most of the existing and forthcoming ISO15693 tags like Tag-it®, ST, Fujitsu, Infineon etc. The Access 7 C is available with Access Basic and Access Quattro design options as well as most common interfaces for easy integration.
Read more| Make | Idesco |
|---|---|
| Manufacturer | Idesco Oy |
| Category | Access Control>Access control readers |
| Model code | Access 7 C |
| Reader Type | Smart Card |
| Standalone/ Networkable | Standalone |
| IP Rating | IP67 |
| Mount Type | Surface mount |
| LED / Beep | LED / Beep |
| Wiegand Interface | Yes |
| Clock-and-Data Interface | Yes |
| Electrical Specifications |
Voltage: 24 V DC Power Consumption: 100 mA |
| Physical Specifications | Dimensions mm: 110 x 43 x 24 |
| Environmental Specifications | Operating Temp oC: -40 ~ +55 |
| Protection | Vandal & Weather Resistant |
| Additional info |
These multi-technology readers read the unique IDnumbers of Philips Mifare®, I-Code®, Inside PicoTag®and PicoPass®, HID iClass®, LEGIC Advant® and most of the existing and forthcoming ISO15693 tags like Tag-it®, ST, Fujitsu, Infineon etc. The Access 7 C is available with Access Basic and Access Quattro design options as well as most common interfaces for easy integration. |
- See other Idesco products
- Idesco Access control software
Related Whitepapers
Access and security in the age of hybrid working
Integrated access control: reap the benefits of connected security
Three essential reasons to upgrade your access control technology in 2022
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

