Readers and Credentials


Evolution of secure identification technology.

Evolución tecnológica de las credenciales
1ª Generación
Cortesía HID

1st Generation

  • 125 KHz
  • Well defined magnetic field
  • Good performance in the presence of metal
  • Good signal capacity to pass through materials
  • Not affected by liquids
  • Low read/write speed
  • Fairly limited read distance (typically 8-10cm)
2ª Generación
Cortesía HID

2nd Generation

  • 13.56 MHz
  • Well-defined magnetic field
  • Signal can pass through most materials, with the exception of metals, that cause attenuation
  • Several tags can be read at the same time (anti-collision)
  • Reading can reach up to 90cm
  • ISO14443 and ISO15693 compliant
3ª Generación
Cortesía HID

3rd Generation

  • 13.56 MHz
  • SIO (Secure Identity Object™) is added which consists of a number of separate but associated data objects for such items as physical access control (card numbers, for example), fingerprint templates, and cash on the card.
  • ISO14443 and ISO15693 compliant.
4ª Generación
Cortesía HID

4th Generation

  • SEOS. It operates on 13.56Mhz but with software embedded in the microprocessor. Sends an encrypted number to the reader.
  • Optimal encryption allows for unparalleled data protection and confidentiality, creating a more secure environment than other credential technologies.
  • Mobile Access is developed.
Mobile Access
Cortesía HID

Mobile Accesss

Now you can use your smartphone, tablet or laptop to open doors, gates, access networks and more. This new access control solution greatly enhances user convenience in today's mobile-first world and helps your organization portray a more modern and professional image.



Main Features

  • Benefit from today's highest level of access control security and convenience.
  • Dynamic technology support with multiple credentials, including: iCLASS Seos®, iCLASS SE, iCLASS® standard, MIFARE®, MIFARE DESFire®, Prox and more.
  • Supports a wide range of form factors including cards, transmitters, wristbands and mobile devices. Fingerprint and facial recognition.
  • Ongoing development to offer new features and functionality.


Types of Reader

Lectores Biométricos

Biometric Readers

  • They use biometrics as data to be validated: Fingerprint or Facial recognition.
  • They can also incorporate RFID technology to incorporate proximity devices reading: cards or TAGS.
  • As they are biometric, it is not necessary to have cards and bear the costs they represent in terms of provisioning and lost replacement.
Lectores RFID

RFID readers

  • Incorporate RFID technology for reading proximity devices: cards or TAGS.
  • Simple installation and configuration of the devices.
  • Allows reading several generations of proximity devices. Depending on the brand, such as HID Multi-Class.
  • Available with different reading distances. Short range (10-15cm) or long range (3-4mts) for reading in vehicles.
Protocolos Wiegand y OSDP

Wiegand and OSDP protocols

  • Encrypted communication standard.
  • Allows secure and efficient communication between different manufacturers.
  • Allows integration with other subsystems.
  • Both protocols are the most widely used in the market.

What We Offer

What we offer

Technology Partners

Axis Communications logo
Kantech logo
Bosch logo
Software House logo
HID logo
Wolpac logo
Came logo
Iris ID logo
CDVI logo
Lenel S2 logo
Eyelock logo
RBH logo
Idemia logo


Ask an Expert

Contact one of our Access Control Systems Experts.