S10 Smart Card Readers 6

Reset All
Part RoHS Manufacturer Brand Name Product Line Product Model Form Factor Product Type TAA Compliant Product Color Memory Maximum Operating Range Energy Star Media Supported Shipping Height Weight (Approximate) Environmental Certification Environmentally Friendly Input Voltage Limited Warranty Thickness Wireless Technology Memory Card Supported Input Current Product Series LED Indicator Platform Supported Depth Media Slots Packaged Quantity Height Width Product Name Rugged Shipping Width Package Type Length Host Interface Shipping Weight (Approximate) Shipping Depth Country of Origin Connectivity Technology

8030DSDF

HID Global Corporation

HID

SmartID

S10

Smart Card Reader

Silver

WEEE, RoHS

Yes

Lifetime

SmartID S10 Smart Card Reader

8030DSHM

HID Global Corporation

HID

SmartID

S10

Smart Card Reader

Silver

RoHS, WEEE

Yes

Lifetime

SmartID S10 Mullion Smart Card Reader

8030DSDM

HID Global Corporation

HID

SmartID

S10

Smart Card Reader

Silver

RoHS, WEEE

Yes

Lifetime

0.98 "

5.59 "

1.81 "

SmartID S10 Smart Card Reader

Cable

8030DSHC

HID Global Corporation

HID

SmartID

S10

Smart Card Reader

Silver

RoHS, WEEE

Yes

SmartID S10 Smart Card Reader

800-8080

HID Global Corporation

HID

SmartID

S10

Smart Card Reader

Silver

RoHS

Yes

Lifetime

0.98 "

5.59 "

1.81 "

SmartID S10 Smart Card Reader

Cable

800-8030

HID Global Corporation

HID

SmartID

S10

Smart Card Reader

Silver

WEEE, RoHS

Yes

SmartID Mullion S10 Smart Card Reader

Smart Card Readers

Smart card readers are peripheral devices used to read and write data to smart cards, which are small plastic cards embedded with integrated circuits containing data or microprocessors. These readers typically connect to a computer's USB port and provide a secure and convenient way to access data stored on smart cards. Smart card readers are commonly used in applications such as access control, electronic payments, identity verification, and digital signatures. They offer enhanced security features, such as encryption and authentication, to protect sensitive data and transactions.