R/W M iButton Reader

REF: 14046000

Card reader iButton M is designed for reading and writing cards DESFire® 13.56 MHz and its installation in confined spaces.

The communication between the reader and the controller is protected by a 128bit AES encryption. This encryption avoids the monitoring of communications between the two.

M iButton reader allows the use of Mifare® sectors encrypted to store the serial number of the card, avoiding the use of the CSN card will not be protected and be unsafe.

Thanks to the ability to read/write, iButton M reader also allows the use of DOC SYNC™ technology for the integration of stand-alone equipment.

Features

Made with high-resistance polycarbonate plastic with stainless steel base.

Metallic finish and LEDs to check the status:red, green and beep.

The proximity tecnology available is MIFARE® ISO14443A (13,56 MHz) with read and write capacity on card.

It also allows the CSN of MIFARE® ULTRALIGHT, MIFARE® DESFIRE®, MIFARE® DESFIRE® EV1 cards to be read.

Recommended for both access control instalations with centalised operation and with DOC operation (Dorlet On Card).

Surface mounted, a bracket can be purchased for assembly on pipe or conduit, including tamper signal over reader comunication.

Conectable to any Dorlet access control CPU of the AS, ASD and AHS series.

Specifications

TECHNICAL

  • Signaling: Red-green led and buzzer
  • Operating range: From -10ºC to 55ºC (up to 93% humidity)
  • Reading range (R/W): Up to 5 cm. (3 cm.)
  • Protection: IP55, IK04
  • Reading technology: Proximity MIFARE®
  • Material: Polycarbonate plastic
  • Reading frequency: 13,56 MHz
  • Maximum consumption: 125 mA
  • Dimensions: 80 x 29 x 20 mm.
  • Writting possibility: Yes
  • Connections: 4 wires (see cable type in manual)
  • Certification: (in 60839-11-1) clase iii, security grade 4
  • Power supply: 12 Vdc
  • Finish: Black

Data Sheet

Related products

No results found

Within the same category

Related solutions

Get in touch

Responsible: Dorlet S.A.U.

Purpose: Management of requests and queries.

Legitimation: Consent obtained, legitimate interest and compliance with regulations.

Recipients: Third party service providers, including international transfers.

Rights: Access, rectification, deletion, limitation of processing, data portability or opposition, including opposition to automated individual decisions.

Provenance: User.