Software House RM1-PH Access control reader
Technical Specification
- Make: Software House
- Model code: RM1-PH
- Series: RM Series
- Long Range: Yes
- Reader Type: Proximity
The RM HID Proximity reader combines the convenience and high reliability of HID ProxPro® proximity technology with the advanced electronics and stylish packaging of the RM card readers. A variety of access credentials are supported depending on your needs, including support for photo identification badges and combination technology. The RM HID Proximity Reader is available in standard and mullion styles..
Read more| Make | Software House |
|---|---|
| Manufacturer | Software House |
| Category | Access Control>Access control readers |
| Model code | RM1-PH |
| Series | RM Series |
| Long Range | Yes |
| Reader Type | Proximity |
| Standalone/ Networkable | Standalone |
| Read Range mm | 114 mm |
| LED / Beep | LED / Beep |
| Electrical Specifications |
Voltage: 12 V DC Power Consumption: 250 mA |
| Physical Specifications |
Dimensions mm: 129.5 x 142.2 x 49.5 Weight g: 280 |
| Environmental Specifications | Operating Temp oC: -30 ~ +60 |
| Protection | Weather Resistant |
| Additional info |
The RM HID Proximity reader combines the convenience and high reliability of HID ProxPro® proximity technology with the advanced electronics and stylish packaging of the RM card readers. A variety of access credentials are supported depending on your needs, including support for photo identification badges and combination technology. The RM HID Proximity Reader is available in standard and mullion styles. . |
Related Whitepapers
The critical importance of Trusted Execution Environment in access control
Open credential standards and the impact on physical access control
System design considerations to optimize physical access control
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

