Secura Key Launches New RFID Flat Pad Antenna for Library Applications

Secura Key Launches New RFID Flat Pad Antenna for Library Applications

Secura Key Launches New RFID Flat Pad Antenna for Library ApplicationsSecura Key announces the release of its new Model ET-ANT 13x9 flat Secura Key Launches New RFID Flat Pad Antenna for Library Applicationspad antenna for read/write desktop applications, such as library checkout, inventory systems, or other track and trace applications, requiring the reading of any articles, documents and books that are identified with HF contactless labels. The ET-ANT 13x9 is an extremely-thin package at 0.30", which makes it easy to slide articles across. It has a Lexan top cover and a rubber cushioned bottom pad to prevent sliding.  It has an 8-ft cable fitted with an SMA connector and an MMCX adapter is also included.  Impedance is 50 Ohms. 

The Secura Key ET9-USB-1 reader is an excellent match for this antenna. It plugs into a standard USB port on a laptop or desktop computer, and provides enough power to read an HF label at 8-9" using the ET-ANT 13x9. This reader is the same size as a USB flash drive and requires no other external electronics or power. The ET9-USB-1 reads and writes to 13.56 MHz ISO 15693 tags or labels. It is a pass-through device, allowing an application to communicate directly with an HF tag or label.

Featured

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

Featured Cybersecurity

New Products

  • Pivot3 Surety

    Pivot3 Surety

    Pivot3 has announced Surety, a new intelligent software framework to simplify the management and monitoring of physical security environments. 3

  • SAFR® from RealNetworks

    SAFR® from RealNetworks

    A unique feature in SAFR version 3.4 is its ability to automate alerts to security personnel when a spoofing attempt or a fraudulent attempt to gain access is detected. 3

  • Dahua 2-Wire IP Video Intercom System

    Dahua 2-Wire IP Video Intercom System

    Dahua Technology is introducing a new line of expandable 2-wire IP video intercom solutions for the North America market. The New 2-wire IP video intercom is more advanced, cost effective, and designed to help businesses increase their security. 3