Product Description
Features
- Wiegand based Entry/Exit Readers
- Operating frequency of 125 kHz
- Read range of 3 to 5cm
- Weigand transmit distance 200Mtr
- Multi-cards simultaneous read ability
- Lightning proof protection
- Premium ABS enclosure with blue LED indication
Technical Specification
| Parameter | Specifications |
| Working Voltage | DC 9 ~16V |
| Working current | <=100mA |
| Communication Distance | <=100 Mtr |
| Reading Range | 3 to 5cm |
| Dimension | 100 X 46 X 20(mm) |
| Output Format | Wiegand 26/44 |
| Working Temperature | .-10~+70 °C |
| Working Humidity | 10% to 95% R.H |
| Card Type | EM-ID/Mifare |
Flexible Identification MethodsThis RFID Access Control System supports various access methods such as RFID cards, key fobs, tags, and PIN codes. Depending on the model, users can easily program their preferred method for secure and convenient entry, optimizing adaptability for diverse organizational needs.
Robust Security FeaturesEquipped with tamper and door contact alarms, anti-passback, and touchless operation, the system ensures robust security. Enhanced by access logging and time attendance integration via networked software, it provides comprehensive control and monitoring for premises of all sizes.
User-Friendly ManagementDesigned for scalability, the system supports up to 2,000 users and includes user programming directly on the unit or via connected software. Time zone assignment and remote control capabilities simplify access management while supporting reliable operation in varied environmental conditions.
FAQs of RFID Access Control System:
Q: How do users gain access with the RFID Access Control System?
A: Users can gain access by presenting an RFID card, key fob, or tag near the reader, or entering a PIN code if the system features a keypad. Identification is confirmed within a 310 cm range, making entry quick and touch-free.
Q: What benefits does access logging provide?
A: Access logging records every entry and exit, supporting time attendance tracking and audit trails. With networked models and software integration, administrators can review logs to enhance security and operational oversight.
Q: When is remote control available in the system?
A: Remote control is supported with optional software or relay modules. This allows authorized personnel to manage access, set user permissions, or unlock doors from a central location for added convenience and security.
Q: Where can the RFID Access Control System be installed?
A: The system is ideal for installation in office complexes, residential buildings, secure areas, industrial premises, and institutions. It is designed for wall-mounting and supports a variety of access point configurations.
Q: What is the process for adding or removing users from the system?
A: Administrators can add or remove users directly on the control unit or through connected software (model dependent). User details, identification cards, and time zone restrictions are managed efficiently, streamlining personnel changes.
Q: How does touchless operation improve usage?
A: Touchless operation minimizes physical contact, reducing the risk of cross-contamination and wear. Users simply present cards or fobs near the reader for fast, hygienic access, especially important in high-traffic environments.
Q: What are the security and identification standards supported?
A: Depending on the model, the system supports EM/MIFARE/IC cards and complies with ISO/IEC 14443A and ISO 15693 standards, ensuring secure, standardized identification for reliable access control.