Idesco IR 6090 B microlog access control reader with RS232 interface
Technical Specification
- Make: Idesco
- Model code: IR 6090 B
- Protection: IP67
- Voltage: 8 ~ 30 V DC
- Power Consumption: 100 mA
Idesco Microlog IR 6090 B reader is designed for RFID applications requiring good performance and reliability. Typical applications are factory automation and data collection. Both system integrators and end-users may use the reader and its software support for system solutions. The reader is compatible with all Idesco Microlog read/ write cards and tags. High speed, full duplex communication with RF tags is well secured. The data transmitted to the tag is echoed back to the reader for verification. Automatic double read activated by the reader is also used for additional verification of data.
Read more| Make | Idesco |
|---|---|
| Manufacturer | Idesco Oy |
| Category | Access Control>Access control systems & kits |
| Model code | IR 6090 B |
| Environmental Specifications | Protection: IP67 |
| Electrical Specifications |
Voltage: 8 ~ 30 V DC Power Consumption: 100 mA |
| Physical Specifications | Dimensions mm: 110 x 43 x 24 |
| Additional info | Idesco Microlog IR 6090 B reader is designed for RFID applications requiring good performance and reliability. Typical applications are factory automation and data collection. Both system integrators and end-users may use the reader and its software support for system solutions. The reader is compatible with all Idesco Microlog read/ write cards and tags. High speed, full duplex communication with RF tags is well secured. The data transmitted to the tag is echoed back to the reader for verification. Automatic double read activated by the reader is also used for additional verification of data. |
You might be interested in these products
- See other Idesco products
- Idesco Access control readers
- Idesco Access control software
Related Whitepapers
The critical role of access control in K-12 school security
The benefits of Edge AI + Cloud for security systems
Integrated access control: reap the benefits of connected security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

