Shenzhen Rakinda Technologies Co.,Ltd .
The leader of the barcode scanner module in the world.
|Place of Origin:||China|
|Minimum Order Quantity:||1PCS|
|Packaging Details:||Normal craft paper and foam|
|Delivery Time:||Within 5 working days after receiving the balance|
|Payment Terms:||Western Union, T/T, L/C, D/A, D/P, MoneyGram|
|Barcode Scanner:||1D 2D QR Code||Sealing:||IP64|
|Interface:||TCP IP Weigand||IC Card:||Mifare Card 4Bytes And 7Bytes|
|SDK:||Software Development Kit||Optional:||Wifi Bluetooth|
barcode reader scanner,
handheld uhf rfid reader
The product has Wiegand 26/ 34 output when the product is used as a 2d code reader, which can make the traditional access control, lift control, yard products,own the 2d code access function immediately without changing the main controller.
And can access legally when it must comply with the rules of the 2d code so that the traditional access control, lift control and yard products have a real CPU system security level at once and reduce system costs greatly.
1. Single-door access control + 2d code scanner engine + the second generation ID card reader
Three in one card products. Make site installation and maintenance become simple with lower cost.
2. Wiegand 26/ 34 output
When the product is used as a 2d code reader, which can make the traditional access control, ladder control, yard products,own the 2d code access function immediately without changing the main controller.
3. 2-channel relay output
In addition to 1 channel to control the door lock, other 1 channel to control the door opener, lights, players, valves and so on.
4. Voice amplifier and speakers
The network control play nearly 150 voices that can be customized.
5. Off Line to Open Door
Meet the agreed rules of the encrypted 2d code, in the case of no network, you can open the door or barrier directly.
The agreement rule mainly includes:
1) The effective start time and end time of the 2d code;
2) The effective number of the 2d code, the 2d code can not be used any more if exceeds the usage times;
3) Device MAC matched or project number building number matched, a 2d code can contain one or more device numbers and be valid on multiple devices;
4) 2d code encryption keys can be modified without leaving any back door Or loopholes to ensure 2d code security.
6. Network IP parameters, lock delay, Wiegand 26/34
Can be set directly through the 2d code to make on-site debugging easier.
7. Equipment capacity
Card 35,000 pieces, record 50,000 pieces, 2d code times 100,000, records and 2d code times are automatically looped over capacity.
8. Data memory and the ferroelectric memory
Even if the device suddenly power-down, it will not lose the stored data to ensure data safe and reliable.
9. Multi Card Reader
Identify M1 card, second-generation ID card, CPU card, UltraLight, SR176, SRIX4K card number.
10. RJ45 10 / 100M TCP / IP transmission,WIFI transmission or mobile phone Bluetooth transmission,Supports TCP/IP remote IAP upgrade.
11. Built-in dual hardware anti-crash watchdog
Even if the chip operation appear abnormalities, it can be restored in time, which does not affect the use.
12. Docking DEMO Language: JAVA, C#, C++, etc
Contact Person: Yaping Wang